Technical Reports
2018 Technical Reports
-
R. AlTawy, R. Rohit, M. He, K. Mandal, G. Yang and G. Gong
sLiSCP-light: Towards Lighter Sponge-specific Cryptographic Permutations
pdf
CACR 2018-01
-
M. Yang and G. Gong
Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression
Side-Channel Attacks under HTTPS/TLS
pdf
CACR 2018-02
-
G. Adj, D. Cervantes-Vázquez, J. Chi-Domínguez, A. Menezes and F. Rodríguez-Henríquez
On the Cost of Computing Isogenies Between Supersingular Elliptic Curves
pdf
CACR 2018-03
-
T. Banerjee and M. Anwar Hasan
Energy Efficiency Analysis of Elliptic Curve based Cryptosystems
pdf
CACR 2018-04
-
M. Mostafa, T. Banerjee and M. Anwar Hasan
Energy Exhaustion Attack on Barrett's Reduction
pdf
CACR 2018-05
-
T. Banerjee and M. Anwar Hasan
Energy Consumption of Candidate Algorithms for NIST PQC Standards
pdf
CACR 2018-06
-
R. Rohit and G. Gong
Meet-in-the-Middle attack using Correlated Sequences and its
Applications to Simon-like Ciphers
pdf
CACR 2018-07
-
C. McKnight and I. Goldberg
Style Counsel: Seeing the (Random) Forest for the Trees in
Adversarial Code Stylometry
pdf
CACR 2018-08
-
K. Mandal and G. Gong
On Ideal t-Tuple Distribution of Orthogonal Functions in
Filtering De Bruijn Generators
pdf
CACR 2018-09
-
K. Mandal, G. Gong and C. Liu
NIKE-based Fast Privacy-preserving High-dimensional Data Aggregation
for Mobile Devices
pdf
CACR 2018-10

|