50 results on '"Jacobson JR"'
Search Results
2. High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions
3. Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
4. Practical Isogeny-Based Key-Exchange with Optimal Tightness
5. On Self-equivalence Encodings in White-Box Implementations
6. PRINCEv2 : More Security for (Almost) No Overhead
7. Low-Gate Quantum Golden Collision Finding
8. Not Enough LESS: An Improved Algorithm for Solving Code Equivalence Problems over
9. On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis
10. Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
11. Towards Post-Quantum Security for Signal’s X3DH Handshake
12. WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher
13. Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations
14. Correlation Power Analysis and Higher-Order Masking Implementation of WAGE
15. Trapdoor DDH Groups from Pairings and Isogenies
16. Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath
17. Improvements to Quantum Search Techniques for Block-Ciphers, with Applications to AES
18. Improved (Related-key) Differential Cryptanalysis on GIFT
19. Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
20. On Index Calculus Algorithms for Subfield Curves
21. Weak-Key Distinguishers for AES
22. Boolean Ring Cryptographic Equation Solving
23. Unintended Features of APIs: Cryptanalysis of Incremental HMAC
24. Obfuscating Finite Automata
25. FROST: Flexible Round-Optimized Schnorr Threshold Signatures
26. Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
27. Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM
28. Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments
29. Unsupervised Machine Learning on Encrypted Data
30. Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge
31. A Full RNS Variant of Approximate Homomorphic Encryption
32. Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje
33. Injective Encodings to Binary Ordinary Elliptic Curves
34. A Generalized Attack on Some Variants of the RSA Cryptosystem
35. Provably Secure NTRUEncrypt over Any Cyclotomic Field
36. On the Cost of Computing Isogenies Between Supersingular Elliptic Curves
37. Analysis of Error-Correcting Codes for Lattice-Based Key Exchange
38. EFLASH: A New Multivariate Encryption Scheme
39. Public Key Compression for Constrained Linear Signature Schemes
40. Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
41. Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis
42. Assessing the Feasibility of Single Trace Power Analysis of Frodo
43. Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
44. Finding Integral Distinguishers with Ease
45. Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES
46. Analysis and Improvement of an Authentication Scheme in Incremental Cryptography
47. Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes
48. Integral Attacks on Round-Reduced Bel-T-256
49. Variants of the AES Key Schedule for Better Truncated Differential Bounds
50. Targeted Ciphers for Format-Preserving Encryption
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.