-
1مؤتمر
المؤلفون: Kara, Gizem, Yayla, Oguz
المصدر: 2022 15th International Conference on Information Security and Cryptography (ISCTURKEY) Information Security and Cryptography (ISCTURKEY), 2022 15th International Conference on. :1-7 Oct, 2022
Relation: 2022 15th International Conference on Information Security and Cryptography (ISCTURKEY)
-
2دورية أكاديمية
المؤلفون: Matthias Johann Steiner
المصدر: IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
مصطلحات موضوعية: Gröbner basis, Solving degree, MiMC, GMiMC, Hades, Computer engineering. Computer hardware, TK7885-7895
وصف الملف: electronic resource
-
3كتاب إلكتروني
المؤلفون: Chen, ShiyaoAff9, Guo, ChunAff11, Aff12, Guo, JianAff10, Liu, LiAff11, Aff12, Wang, MeiqinAff11, Aff12, Aff13, Wei, PuwenAff11, Aff12, Aff13, Xu, ZeyuAff11, Aff12
المساهمون: Goos, Gerhard, Founding EditorAff1, Hartmanis, Juris, Founding EditorAff2, Bertino, Elisa, Editorial Board MemberAff3, Gao, Wen, Editorial Board MemberAff4, Steffen, Bernhard, Editorial Board MemberAff5, Yung, Moti, Editorial Board MemberAff6, Seo, Seung-Hyun, editorAff7, Seo, Hwajeong, editorAff8
المصدر: Information Security and Cryptology – ICISC 2022 : 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers. 13849:41-60
-
4دورية أكاديمية
المؤلفون: Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu
المصدر: IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 2 (2023)
مصطلحات موضوعية: Symmetric-Key, Cryptanalysis, Proof, MPC/FHE/ZK-Friendly Primitives, Generalized Feistel, GMiMC, Computer engineering. Computer hardware, TK7885-7895
وصف الملف: electronic resource
-
5كتاب إلكتروني
المؤلفون: Beyne, TimAff10, Canteaut, AnneAff11, Dinur, ItaiAff12, Eichlseder, MariaAff13, Aff14, Leander, GregorAff14, Leurent, GaëtanAff11, Naya-Plasencia, MaríaAff11, Perrin, LéoAff11, Sasaki, YuAff16, Todo, YosukeAff14, Aff16, Wiemer, FriedrichAff14, Aff15
المساهمون: Goos, Gerhard, Founding EditorAff1, Hartmanis, Juris, Founding EditorAff2, Bertino, Elisa, Editorial Board MemberAff3, Gao, Wen, Editorial Board MemberAff4, Steffen, Bernhard, Editorial Board MemberAff5, Woeginger, Gerhard, Editorial Board MemberAff6, Yung, Moti, Editorial Board MemberAff7, Micciancio, Daniele, editorAff8, Ristenpart, Thomas, editorAff9
المصدر: Advances in Cryptology – CRYPTO 2020 : 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III. 12172:299-328
-
6دورية أكاديمية
المؤلفون: Tim Beyne, Yunwen Liu
المصدر: IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 2 (2022)
مصطلحات موضوعية: Truncated differentials, Contracting Feistel ciphers, SMT, GMiMC, SM-4, Computer engineering. Computer hardware, TK7885-7895
وصف الملف: electronic resource
-
7دورية أكاديمية
لا يتم عرض هذه النتيجة على الضيوف.
تسجيل الدخول للوصول الكامل. -
8
المؤلفون: Chen, Shiyao, Guo, Chun, Guo, Jian, Liu, Li, Wang, Meiqin, Wei, Puwen, Xu, Zeyu
المصدر: IACR Transactions on Symmetric Cryptology; Volume 2023, Issue 2; 132-175
مصطلحات موضوعية: Cryptanalysis, Proof, Symmetric-Key, GMiMC, MPC/FHE/ZK-Friendly Primitives, Generalized Feistel
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=issn2519173X::5f7bde09f0c385e5f01b169abf880421
https://tosc.iacr.org/index.php/ToSC/article/view/10981 -
9دورية أكاديمية
لا يتم عرض هذه النتيجة على الضيوف.
تسجيل الدخول للوصول الكامل. -
10
المؤلفون: Anne Canteaut, María Naya-Plasencia, Maria Eichlseder, Léo Perrin, Yu Sasaki, Tim Beyne, Yosuke Todo, Gregor Leander, Gaëtan Leurent, Itai Dinur, Friedrich Wiemer
المساهمون: Catholic University of Leuven - Katholieke Universiteit Leuven (KU Leuven), Cryptologie symétrique, cryptologie fondée sur les codes et information quantique (COSMIQ), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Ben-Gurion University of the Negev (BGU), Graz University of Technology [Graz] (TU Graz), Horst Görtz Institute for IT-security, Ruhr-Universität Bochum [Bochum], NTT Basic Research Laboratories [Tokio], NTT Basic Research Laboratories, NTT Secure Platform Laboratories [Tokyo], Nippon Telegraph & Telephone Corporation - NTT, This research has received funding from StarkWare Industries and the Ethereum Foundation, as part of the process of selecting a STARK-friendly hash function. Tim Beyne is supported by a PhD Fellowship from the Research Foundation – Flanders (FWO). Itai Dinur is supported by the Israeli Science Foundation through grant no. 573/16. Part of this project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreements no. 714294 'QUASYModo', no. 757731 'LightCrypt', and no. 681402 'SOPHIA'). This work was partially supported by the German Federal Ministry of Education and Research (BMBF, project iBlockchain – 16KIS0901K) and by DFG under Germany’s Excellence Strategy – EXC 2092 CASA – 390781972., Daniele Micciancio, Thomas Ristenpart, European Project: 714294,ERC-2016-STG,QUASYModo(2017), European Project: 757731,LightCrypt(2017), European Project: 681402,H2020,ERC-2015-CoG,SOPHIA(2016)
المصدر: Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2020
Advances in Cryptology – CRYPTO 2020 ISBN: 9783030568764
CRYPTO (3)
Advances in Cryptology – CRYPTO 2020, Part III
CRYPTO 2020-40th Annual International Cryptology Conference
CRYPTO 2020-40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.299-328, ⟨10.1007/978-3-030-56877-1_11⟩
Advances in Cryptology – CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part IIIمصطلحات موضوعية: Theoretical computer science, HadesMiMC, Computer science, business.industry, Hash function, Hash functions, Cryptography, 0102 computer and information sciences, 02 engineering and technology, GMiMC, 01 natural sciences, Preimage attack, Integral attacks, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], integrity proof systems, Collision attack, 010201 computation theory & mathematics, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, business, Protocol (object-oriented programming)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::17ba9984b3438439c0f460e30df52e79