Follow
Carlos Cid
Carlos Cid
Simula UiB and Okinawa Institute of Science and Technology
Verified email at simula.no - Homepage
Title
Cited by
Cited by
Year
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
2292018
Small scale variants of the AES
C Cid, S Murphy, MJB Robshaw
International Workshop on Fast Software Encryption, 145-162, 2005
1792005
On the complexity of the BKW algorithm on LWE
MR Albrecht, C Cid, JC Faugere, R Fitzpatrick, L Perret
Designs, Codes and Cryptography 74, 325-354, 2015
1582015
Algebraic techniques in differential cryptanalysis
M Albrecht, C Cid
International Workshop on Fast Software Encryption, 193-208, 2009
1462009
An analysis of the XSL algorithm
C Cid, G Leurent
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
1332005
Algebraic aspects of the advanced encryption standard
C Cid, S Murphy, M Robshaw
Springer Science & Business Media, 2006
1312006
Multi-client non-interactive verifiable computation
SG Choi, J Katz, R Kumaresan, C Cid
Theory of Cryptography Conference, 499-518, 2013
1192013
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
MR Albrecht, C Cid, L Grassi, D Khovratovich, R Lüftenegger, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
1022019
An efficient toolkit for computing private set operations
A Davidson, C Cid
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
872017
Classic McEliece
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
National Institute of Standards and Technology, Tech. Rep, 2020
842020
The eSTREAM portfolio
S Babbage, C Canniere, A Canteaut, C Cid, H Gilbert, T Johansson, ...
eSTREAM, ECRYPT Stream Cipher Project, 1-6, 2008
802008
Algebraic algorithms for LWE problems
M Albrecht, C Cid, JC Faugere, R Fitzpatrick, L Perret
752014
The MAPLE Package “Janet”: I. Polynomial Systems
YA Blinkov, CF Cid, VP Gerdt, W Plesken, D Robertz
Proc. of Computer Algebra in Scientific Computing CASC, 31-40, 2003
722003
On weak keys and forgery attacks against polynomial-based MAC schemes
G Procter, C Cid
Journal of Cryptology 28 (4), 769-795, 2015
712015
A security analysis of Deoxys and its internal tweakable block ciphers
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
IACR Transactions on Symmetric Cryptology, 73-107, 2017
662017
Classic McEliece: conservative code-based cryptography
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
632022
Cold boot key recovery by solving polynomial systems with noise
M Albrecht, C Cid
Applied Cryptography and Network Security: 9th International Conference …, 2011
612011
ECRYPT II yearly report on algorithms and keysizes (2011–2012)
N Smart, S Babbage, D Catalano, C Cid, B Weger, O Dunkelman, M Ward
European network of excellence in cryptology (ECRYPT II), 2012
502012
Are we compromised? Modelling security assessment games
V Pham, C Cid
International Conference on Decision and Game Theory for Security, 234-247, 2012
462012
Nts-kem
M Albrecht, C Cid, KG Paterson, CJ Tjhai, M Tomlinson
NIST PQC Round 2, 4-13, 2019
432019
The system can't perform the operation now. Try again later.
Articles 1–20