Carlos Cid
Carlos Cid
Simula UiB and Okinawa Institute of Science and Technology
Verified email at - Homepage
Cited by
Cited by
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
Small scale variants of the AES
C Cid, S Murphy, MJB Robshaw
International Workshop on Fast Software Encryption, 145-162, 2005
On the complexity of the BKW algorithm on LWE
MR Albrecht, C Cid, JC Faugere, R Fitzpatrick, L Perret
Designs, Codes and Cryptography 74, 325-354, 2015
Algebraic techniques in differential cryptanalysis
M Albrecht, C Cid
International Workshop on Fast Software Encryption, 193-208, 2009
An analysis of the XSL algorithm
C Cid, G Leurent
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
Algebraic aspects of the advanced encryption standard
C Cid, S Murphy, M Robshaw
Springer Science & Business Media, 2006
Multi-client non-interactive verifiable computation
SG Choi, J Katz, R Kumaresan, C Cid
Theory of Cryptography Conference, 499-518, 2013
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
MR Albrecht, C Cid, L Grassi, D Khovratovich, R Lüftenegger, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
The eSTREAM portfolio
S Babbage, C Canniere, A Canteaut, C Cid, H Gilbert, T Johansson, ...
eSTREAM, ECRYPT Stream Cipher Project, 1-6, 2008
An efficient toolkit for computing private set operations
A Davidson, C Cid
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
The MAPLE Package “Janet”: I. Polynomial Systems
YA Blinkov, CF Cid, VP Gerdt, W Plesken, D Robertz
Proc. of Computer Algebra in Scientific Computing CASC, 31-40, 2003
On weak keys and forgery attacks against polynomial-based MAC schemes
G Procter, C Cid
Journal of Cryptology 28 (4), 769-795, 2015
Classic McEliece
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
National Institute of Standards and Technology, Tech. Rep, 2020
Algebraic algorithms for LWE problems
M Albrecht, C Cid, JC Faugere, R Fitzpatrick, L Perret
Cold boot key recovery by solving polynomial systems with noise
M Albrecht, C Cid
Applied Cryptography and Network Security: 9th International Conference …, 2011
A security analysis of Deoxys and its internal tweakable block ciphers
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
IACR Transactions on Symmetric Cryptology, 73-107, 2017
Classic McEliece: conservative code-based cryptography
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
ECRYPT II yearly report on algorithms and keysizes (2011–2012)
N Smart, S Babbage, D Catalano, C Cid, B Weger, O Dunkelman, M Ward
European network of excellence in cryptology (ECRYPT II), 2012
Are we compromised? Modelling security assessment games
V Pham, C Cid
International Conference on Decision and Game Theory for Security, 234-247, 2012
Computation of five-and six-dimensional Bieberbach groups
C Cid, T Schulz
Experimental Mathematics 10 (1), 109-115, 2001
The system can't perform the operation now. Try again later.
Articles 1–20