22:32 On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear...
15:34 Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Ci...
24:14 Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
23:32 On the Feistel Counterpart of the Boomerang Connectivity Table: Introduction and Analysis of th...
23:25 Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Constructi...
22:11 Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysi...
23:02 Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the...