Search

Your search keyword '"Reyzin, Leonid"' showing total 383 results

Search Constraints

Start Over You searched for: Author "Reyzin, Leonid" Remove constraint Author: "Reyzin, Leonid"
383 results on '"Reyzin, Leonid"'

Search Results

151. FuLeakage: Breaking FuLeeca by Learning Attacks

152. CryptAttackTester: high-assurance attack analysis

153. Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods

155. Quantum Complexity for Discrete Logarithms and Related Problems

156. Pseudorandom Error-Correcting Codes

157. Space-Efficient and Noise-Robust Quantum Factoring

159. Quantum Lattice Enumeration in Limited Depth

160. Quantum Advantage from One-Way Functions

161. Traceable Secret Sharing: Strong Security and Efficient Constructions

163. On Sequential Functions and Fine-Grained Cryptography

164. Sometimes You Can’t Distribute Random-Oracle-Based Proofs

165. Improved Algorithms for Finding Fixed-Degree Isogenies Between Supersingular Elliptic Curves

166. Stochastic Secret Sharing with 1-Bit Shares and Applications to MPC

168. Memory-Sample Lower Bounds for LWE

169. Feistel-Like Structures Revisited: Classification and Cryptanalysis

171. Radical Isogeny Formulae

173. The One-Wayness of Jacobi Signatures

176. Information-Theoretic Security with Asymmetries

177. Algebraic Structure of the Iterates of

178. HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits

180. The Committing Security of MACs with Applications to Generic Composition

181. The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives

182. Succinctly-Committing Authenticated Encryption

185. Improving Generic Attacks Using Exceptional Functions

187. Generic MitM Attack Frameworks on Sponge Constructions

188. Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM

189. Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT

191. Field-Agnostic SNARKs from Expand-Accumulate Codes

193. Greyhound: Fast Polynomial Commitments from Lattices

195. Zero-Knowledge IOPs Approaching Witness Length

196. Adaptive Security in SNARGs via iO and Lossy Functions

197. Polymath: Groth16 Is Not the Limit

198. Adaptively Sound Zero-Knowledge SNARKs for UP

200. HyperNova: Recursive Arguments for Customizable Constraint Systems

Catalog

Books, media, physical & digital resources