History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 88 total

A parallel repetition theorem for entangled projection games. (English)
Comput. Complexity 24, No. 2, 201-254 (2015).
1
Cryptanalysis of SP Networks with Partial Non-Linear Layers. (English)
EUROCRYPT (1), 315-342(2015)
2
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function. (English)
EUROCRYPT (1), 733-761(2015)
3
Direct Sum Testing. (English)
ITCS, 327-336(2015)
4
The Computational Benefit of Correlated Instances. (English)
ITCS, 219-228(2015)
5
Derandomized Graph Product Results Using the Low Degree Long Code. (English)
STACS, 275-287(2015)
6
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE. (English)
EUROCRYPT (1), 231-253(2015)
7
Analytical approach to parallel repetition. (English)
Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 ‒ June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 624-633 (2014).
8
Cryptanalysis of iterated Even-Mansour schemes with two keys. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 439-457 (2014).
9
Improved practical attacks on round-reduced Keccak. (English)
J. Cryptology 27, No. 2, 183-209 (2014).
10
Improved generic attacks against hash-based macs and HAIFA. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 149-168 (2014).
11
Cryptanalysis of FIDES. (English)
FSE, 224-240(2014)
12
A Parallel Repetition Theorem for Entangled Projection Games. (English)
IEEE Conference on Computational Complexity, 197-208(2014)
13
Improved Differential Cryptanalysis of Round-Reduced Speck. (English)
Selected Areas in Cryptography, 147-164(2014)
14
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. (English)
FSE, 390-410(2014)
15
Dissection: a new paradigm for solving bicomposite search problems. (English)
Commun. ACMCommun. ACM 57, N0. 10, 98-105(2014)
16
Direct Product Testing. (English)
IEEE Conference on Computational Complexity, 188-196(2014)
17
Composition of low-error 2-query PCPs using decodable PCPs. (English)
SIAM J. Comput. 42, No. 6, 2452-2486 (2013).
18
Key recovery attacks on 3-round even-mansour, 8-step LED-128, and full $\mathrm{AES}^{2}$. (English)
Sako, Kazue (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1‒5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 337-356 (2013).
19
Clustering in the Boolean hypercube in a list decoding regime. (English)
Fomin, Fedor V. (ed.) et al., Automata, languages, and programming. 40th international colloquium, ICALP 2013, Riga, Latvia, July 8‒12, 2013, Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-39205-4/pbk). Lecture Notes in Computer Science 7965, 413-424 (2013).
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 88 total