Carlos Cid

Orcid: 0000-0001-5761-8694

According to our database1, Carlos Cid authored at least 57 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation.
IACR Cryptol. ePrint Arch., 2023

2022
Influence of the Linear Layer on the Algebraic Degree in SP-Networks.
IACR Trans. Symmetric Cryptol., 2022

2021
Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics.
Inf., 2021

FASTA â€" a stream cipher for fast FHE evaluation.
IACR Cryptol. ePrint Arch., 2021

Partitioning Oracles from Weak Key Forgeries.
IACR Cryptol. ePrint Arch., 2021

A Comparison of GKE Protocols based on SIDH.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Partition Oracles from Weak Key Forgeries.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings.
IACR Cryptol. ePrint Arch., 2020

Higher-Order Differentials of Ciphers with Low-Degree S-Boxes.
IACR Cryptol. ePrint Arch., 2020

Integerwise Functional Bootstrapping on TFHE.
Proceedings of the Information Security - 23rd International Conference, 2020

2019
Cryptanalysis of the Multivariate Encryption Scheme EFLASH.
IACR Cryptol. ePrint Arch., 2019

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
IACR Cryptol. ePrint Arch., 2019

2018
Boomerang Connectivity Table: A New Cryptanalysis Tool.
IACR Cryptol. ePrint Arch., 2018

Linear Depth Integer-Wise Homomorphic Division.
Proceedings of the Information Security Theory and Practice, 2018

2017
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

Cloud Storage File Recoverability.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

An Efficient Toolkit for Computing Private Set Operations.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Computing Private Set Operations with Linear Complexities.
IACR Cryptol. ePrint Arch., 2016

A Model for Secure and Mutually Beneficial Software Vulnerability Sharing.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2015
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.
J. Cryptol., 2015

Multi-Client Non-Interactive Verifiable Computation.
IACR Cryptol. ePrint Arch., 2015

Hybrid Publicly Verifiable Computation.
IACR Cryptol. ePrint Arch., 2015

On the complexity of the BKW algorithm on LWE.
Des. Codes Cryptogr., 2015

Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report).
CoRR, 2015

Algebraic algorithms for LWE problems.
ACM Commun. Comput. Algebra, 2015

Algebraic Cryptanalysis and RFID Authentication.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015

Picking vs. Guessing Secrets: A Game-Theoretic Analysis.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Optimal Contracts for Outsourced Computation.
IACR Cryptol. ePrint Arch., 2014

Access Control in Publicly Verifiable Outsourced Computation.
IACR Cryptol. ePrint Arch., 2014

Revocation in Publicly Verifiable Outsourced Computation.
IACR Cryptol. ePrint Arch., 2014

Publicly Verifiable Outsourced Computation with a Key Distribution Centre.
CoRR, 2014

Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2012
On the relation between the MXL family of algorithms and Gröbner basis algorithms.
J. Symb. Comput., 2012

Are We Compromised? Modelling Security Assessment Games.
IACR Cryptol. ePrint Arch., 2012

Memory Access Pattern Protection for Resource-Constrained Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
Cryptanalysis of three matrix-based key establishment protocols.
IACR Cryptol. ePrint Arch., 2011

On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms.
IACR Cryptol. ePrint Arch., 2011

Cold Boot Key Recovery by Solving Polynomial Systems with Noise.
IACR Cryptol. ePrint Arch., 2011

Analysis of Message Injection in Stream Cipher-Based Hash Functions.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
The MIFARE Classic story.
Inf. Secur. Tech. Rep., 2010

Nonlinear Equivalence of Stream Ciphers.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Algebraic Precomputations in Differential and Integral Cryptanalysis.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Cryptanalysis of the MST 3 public key cryptosystem.
J. Math. Cryptol., 2009

Cryptanalysis of the MST<sub>3</sub> Public Key Cryptosystem.
IACR Cryptol. ePrint Arch., 2009

The rakaposhi Stream Cipher.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2008
Algebraic Techniques in Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2008

2006
Recent developments in cryptographic hash functions: Security implications and future directions.
Inf. Secur. Tech. Rep., 2006

An Analysis of the Hermes8 Stream Ciphers.
IACR Cryptol. ePrint Arch., 2006

Algebraic aspects of the advanced encryption standard.
Springer, ISBN: 978-0-387-24363-4, 2006

2005
An Algebraic Framework for Cipher Embeddings.
Proceedings of the Cryptography and Coding, 2005

Small Scale Variants of the AES.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

An Analysis of the XSL Algorithm.
Proceedings of the Advances in Cryptology, 2005

2004
Some Algebraic Aspects of the Advanced Encryption Standard.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Cryptanalysis of a Cryptosystem based on Drinfeld modules.
IACR Cryptol. ePrint Arch., 2003

2001
Computation of Five-and Six-Dimensional Bieberbach Groups.
Exp. Math., 2001


  Loading...