Diana Maimut

Orcid: 0000-0002-9541-5705

According to our database1, Diana Maimut authored at least 29 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Inferring Bivariate Polynomials for Homomorphic Encryption Application.
Cryptogr., June, 2023

Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas.
IACR Cryptol. ePrint Arch., 2023

Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
Speeding-Up Elliptic Curve Cryptography Algorithm.
IACR Cryptol. ePrint Arch., 2022

2021
A Modified Argon2i Using a Tweaked Variant of Blake3.
Proceedings of the 26th IEEE Asia-Pacific Conference on Communications, 2021

2020
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2<sup>k</sup>-Residuosity Assumption.
IACR Cryptol. ePrint Arch., 2020

2019
A Generic View on the Unified Zero-Knowledge Protocol and its Applications.
IACR Cryptol. ePrint Arch., 2019

Speeding Up OMD Instantiations in Hardware.
IACR Cryptol. ePrint Arch., 2019

Physical Cryptography.
IACR Cryptol. ePrint Arch., 2019

Authenticated Key Distribution: When the Coupon Collector is Your Enemy.
IACR Cryptol. ePrint Arch., 2019

2018
Regulating the pace of von Neumann correctors.
J. Cryptogr. Eng., 2018

A Unified Security Perspective on Legally Fair Contract Signing Protocols.
IACR Cryptol. ePrint Arch., 2018

New Configurations of Grain Ciphers: Security Against Slide Attacks.
IACR Cryptol. ePrint Arch., 2018

Backtracking-assisted multiplication.
Cryptogr. Commun., 2018

Post-quantum Cryptography and a (Qu)Bit More.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Public Key-Based Lightweight Swarm Authentication.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
Secretly Embedding Trapdoors into Contract Signing Protocols.
IACR Cryptol. ePrint Arch., 2017

2016
Legally Fair Contract Signing Without Keystones.
IACR Cryptol. ePrint Arch., 2016

Public-Key Based Lightweight Swarm Authentication.
IACR Cryptol. ePrint Arch., 2016

2015
Authentication and encryption protocols : design, attacks and algorithmic improvements. (Protocoles d'authentification et de chiffrement : conception, attaques et améliorations algorithmiques).
PhD thesis, 2015

Applying Cryptographic Acceleration Techniques to Error Correction.
IACR Cryptol. ePrint Arch., 2015

Double-Speed Barrett Moduli.
IACR Cryptol. ePrint Arch., 2015

A Number-Theoretic Error-Correcting Code.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

2014
Authenticated Encryption: Toward Next-Generation Algorithms.
IEEE Secur. Priv., 2014

OMD: A Compression Function Mode of Operation for Authenticated Encryption.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

The relevance of second error probability in modern statistical analysis.
Proceedings of the 6th International Conference on Electronics, 2014

2013
Fault Attacks on Projective-to-Affine Coordinates Conversion.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Lightweight Cryptography for RFID Tags.
IEEE Secur. Priv., 2012

New directions in cloud computing. A security perspective.
Proceedings of the 9th International Conference on Communications, 2012


  Loading...