Results 51 to 60 of about 560 (65)
One More Pair, More Information Gained: Improved Attacks on LowMC with Full S-box Layers Using Two Plaintext/Ciphertext Pairs [PDF]
Motivated by LowMC cryptanalysis challenge, research in recent years focuses more on attacking LowMC in \PICNIC application setting, \ie an attacker can see only a single plaintext/ciphertext pair.
Chao Niu +5 more
core
Faster Quantum Algorithms for MQ2 and Applications [PDF]
We study quantum algorithms for multivariate quadratic Boolean equation systems by focusing on their precise gate count. While better asymptotic algorithms are known, currently gate counts were only computed for exhaustive search (Schwabe and Westerbaan,
André Schrottenloher +2 more
core +1 more source
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
identifier:oai:t2r2.star.titech.ac.jp ...
openaire
Digital Signatures from Symmetric-Key Primitives [PDF]
We propose practically efficient signature schemes which feature several attractive properties: (a) they only rely on the security of symmetric-key primitives (block ciphers, hash functions), and are therefore a viable candidate for post-quantum security,
Christian Rechberger +4 more
core
Sex and Male Circumcision: Women's Preferences Across Different Cultures and Countries: A Systematic Review. [PDF]
Morris BJ +6 more
europepmc +1 more source
Drifting from slow to "D'oh!": working memory capacity and mind wandering predict extreme reaction times and executive control errors. [PDF]
McVay JC, Kane MJ.
europepmc +1 more source
Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack. [PDF]
Wu H, Feng X, Zhang J.
europepmc +1 more source

