Carlos Cid

Orcid: 0000-0001-5761-8694

According to our database1, Carlos Cid authored at least 58 papers between 2001 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Superposition Attacks Against LPN-Based Authentication Protocols.
IACR Cryptol. ePrint Arch., 2025

2022
Influence of the Linear Layer on the Algebraic Degree in SP-Networks.
IACR Trans. Symmetric Cryptol., 2022

FASTA - A Stream Cipher for Fast FHE Evaluation.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography Standardisation.
Proceedings of the Code-Based Cryptography - 10th International Workshop, 2022

2021
Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics.
Inf., 2021

Partitioning Oracles from Weak Key Forgeries.
IACR Cryptol. ePrint Arch., 2021

A Comparison of GKE Protocols based on SIDH.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Partition Oracles from Weak Key Forgeries.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Higher-Order Differentials of Ciphers with Low-Degree S-Boxes.
IACR Cryptol. ePrint Arch., 2020

Integerwise Functional Bootstrapping on TFHE.
Proceedings of the Information Security - 23rd International Conference, 2020

Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key Settings.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Cryptanalysis of the Multivariate Encryption Scheme EFLASH.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Linear Depth Integer-Wise Homomorphic Division.
Proceedings of the Information Security Theory and Practice, 2018

Boomerang Connectivity Table: A New Cryptanalysis Tool.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

Cloud Storage File Recoverability.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

An Efficient Toolkit for Computing Private Set Operations.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Computing Private Set Operations with Linear Complexities.
IACR Cryptol. ePrint Arch., 2016

Hybrid Publicly Verifiable Computation.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

A Model for Secure and Mutually Beneficial Software Vulnerability Sharing.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2015
Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report).
CoRR, 2015

Algebraic Cryptanalysis and RFID Authentication.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015

Picking vs. Guessing Secrets: A Game-Theoretic Analysis.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Access Control in Publicly Verifiable Outsourced Computation.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Algebraic Algorithms for LWE Problems.
IACR Cryptol. ePrint Arch., 2014

Publicly Verifiable Outsourced Computation with a Key Distribution Centre.
CoRR, 2014

Optimal Contracts for Outsourced Computation.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Revocation in Publicly Verifiable Outsourced Computation.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Multi-Client Non-interactive Verifiable Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
On the relation between the MXL family of algorithms and Gröbner basis algorithms.
J. Symb. Comput., 2012

On the Complexity of the BKW Algorithm on LWE.
IACR Cryptol. ePrint Arch., 2012

Are We Compromised? Modelling Security Assessment Games.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Memory Access Pattern Protection for Resource-Constrained Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
Cryptanalysis of three matrix-based key establishment protocols.
IACR Cryptol. ePrint Arch., 2011

On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms.
IACR Cryptol. ePrint Arch., 2011

Analysis of Message Injection in Stream Cipher-Based Hash Functions.
Proceedings of the Applied Cryptography and Network Security, 2011

Cold Boot Key Recovery by Solving Polynomial Systems with Noise.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
The MIFARE Classic story.
Inf. Secur. Tech. Rep., 2010

Nonlinear Equivalence of Stream Ciphers.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Algebraic Precomputations in Differential and Integral Cryptanalysis.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Cryptanalysis of the MST 3 public key cryptosystem.
J. Math. Cryptol., 2009

Cryptanalysis of the MST<sub>3</sub> Public Key Cryptosystem.
IACR Cryptol. ePrint Arch., 2009

The rakaposhi Stream Cipher.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Algebraic Techniques in Differential Cryptanalysis.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2007
An Analysis of the Hermes8 Stream Ciphers.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Recent developments in cryptographic hash functions: Security implications and future directions.
Inf. Secur. Tech. Rep., 2006

Algebraic aspects of the advanced encryption standard.
Springer, ISBN: 978-0-387-24363-4, 2006

2005
An Algebraic Framework for Cipher Embeddings.
Proceedings of the Cryptography and Coding, 2005

Small Scale Variants of the AES.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

An Analysis of the XSL Algorithm.
Proceedings of the Advances in Cryptology, 2005

2004
Some Algebraic Aspects of the Advanced Encryption Standard.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Cryptanalysis of a Cryptosystem based on Drinfeld modules.
IACR Cryptol. ePrint Arch., 2003

2001
Computation of Five-and Six-Dimensional Bieberbach Groups.
Exp. Math., 2001


  Loading...