Follow
Carlos Cid
Carlos Cid
Simula UiB and Okinawa Institute of Science and Technology
Verified email at simula.no - Homepage
Title
Cited by
Cited by
Year
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1772018
Small scale variants of the AES
C Cid, S Murphy, MJB Robshaw
International Workshop on Fast Software Encryption, 145-162, 2005
1722005
On the complexity of the BKW algorithm on LWE
MR Albrecht, C Cid, JC Faugere, R Fitzpatrick, L Perret
Designs, Codes and Cryptography 74, 325-354, 2015
1492015
Algebraic techniques in differential cryptanalysis
M Albrecht, C Cid
International Workshop on Fast Software Encryption, 193-208, 2009
1382009
Algebraic aspects of the advanced encryption standard
C Cid, S Murphy, M Robshaw
Springer Science & Business Media, 2006
1272006
An analysis of the XSL algorithm
C Cid, G Leurent
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
1262005
Multi-client non-interactive verifiable computation
SG Choi, J Katz, R Kumaresan, C Cid
Theory of Cryptography Conference, 499-518, 2013
1162013
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
MR Albrecht, C Cid, L Grassi, D Khovratovich, R Lüftenegger, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
782019
On weak keys and forgery attacks against polynomial-based MAC schemes
G Procter, C Cid
Journal of Cryptology 28 (4), 769-795, 2015
702015
The eSTREAM portfolio
S Babbage, C Canniere, A Canteaut, C Cid, H Gilbert, T Johansson, ...
eSTREAM, ECRYPT Stream Cipher Project, 1-6, 2008
692008
The MAPLE Package “Janet”: I. Polynomial Systems
YA Blinkov, CF Cid, VP Gerdt, W Plesken, D Robertz
Proc. of Computer Algebra in Scientific Computing CASC, 31-40, 2003
682003
Algebraic algorithms for LWE problems
M Albrecht, C Cid, JC Faugere, R Fitzpatrick, L Perret
672014
An efficient toolkit for computing private set operations
A Davidson, C Cid
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
652017
Cold boot key recovery by solving polynomial systems with noise
M Albrecht, C Cid
Applied Cryptography and Network Security: 9th International Conference …, 2011
622011
Classic McEliece
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
NIST Post-Quantum Cryptography Standardization Project (Round 3), 2020
612020
A security analysis of Deoxys and its internal tweakable block ciphers
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
IACR Transactions on Symmetric Cryptology, 73-107, 2017
532017
ECRYPT II yearly report on algorithms and keysizes (2011–2012)
N Smart, S Babbage, D Catalano, C Cid, B Weger, O Dunkelman, M Ward
European network of excellence in cryptology (ECRYPT II), 2012
482012
Are we compromised? Modelling security assessment games
V Pham, C Cid
International Conference on Decision and Game Theory for Security, 234-247, 2012
462012
Classic McEliece: conservative code-based cryptography
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
432022
Strategic discovery and sharing of vulnerabilities in competitive environments
MHR Khouzani, V Pham, C Cid
Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014
412014
The system can't perform the operation now. Try again later.
Articles 1–20