default search action
Carlos Cid
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i30]Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson:
Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation. IACR Cryptol. ePrint Arch. 2023: 10 (2023) - 2022
- [j12]Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Influence of the Linear Layer on the Algebraic Degree in SP-Networks. IACR Trans. Symmetric Cryptol. 2022(1): 110-137 (2022) - [c35]Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson:
Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography Standardisation. CBCrypto 2022: 21-36 - [c34]Carlos Cid, John Petter Indrøy, Håvard Raddum:
FASTA - A Stream Cipher for Fast FHE Evaluation. CT-RSA 2022: 451-483 - 2021
- [j11]Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid:
Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics. Inf. 12(8): 297 (2021) - [c33]Marcel Armour, Carlos Cid:
Partition Oracles from Weak Key Forgeries. CANS 2021: 42-62 - [c32]Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid:
A Comparison of GKE Protocols based on SIDH. SECRYPT 2021: 507-514 - [i29]Carlos Cid, John Petter Indrøy, Håvard Raddum:
FASTA â" a stream cipher for fast FHE evaluation. IACR Cryptol. ePrint Arch. 2021: 1205 (2021) - [i28]Marcel Armour, Carlos Cid:
Partitioning Oracles from Weak Key Forgeries. IACR Cryptol. ePrint Arch. 2021: 1296 (2021) - 2020
- [c31]Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid:
Cryptanalysis of the Multivariate Encryption Scheme EFLASH. CT-RSA 2020: 85-105 - [c30]Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim:
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key Settings. INDOCRYPT 2020: 373-394 - [c29]Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid:
Integerwise Functional Bootstrapping on TFHE. ISC 2020: 107-125 - [i27]Carlos Cid, Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Higher-Order Differentials of Ciphers with Low-Degree S-Boxes. IACR Cryptol. ePrint Arch. 2020: 536 (2020) - [i26]Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim:
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings. IACR Cryptol. ePrint Arch. 2020: 959 (2020)
2010 – 2019
- 2019
- [c28]Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. ASIACRYPT (3) 2019: 371-397 - [e2]Carlos Cid, Michael J. Jacobson Jr.:
Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11349, Springer 2019, ISBN 978-3-030-10969-1 [contents] - [i25]Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. IACR Cryptol. ePrint Arch. 2019: 419 (2019) - [i24]Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid:
Cryptanalysis of the Multivariate Encryption Scheme EFLASH. IACR Cryptol. ePrint Arch. 2019: 1160 (2019) - 2018
- [c27]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. EUROCRYPT (2) 2018: 683-714 - [c26]Hiroki Okada, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto:
Linear Depth Integer-Wise Homomorphic Division. WISTP 2018: 91-106 - [i23]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. IACR Cryptol. ePrint Arch. 2018: 161 (2018) - 2017
- [j10]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(3): 73-107 (2017) - [c25]Alex Davidson, Carlos Cid:
An Efficient Toolkit for Computing Private Set Operations. ACISP (2) 2017: 261-278 - [c24]Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid:
Cloud Storage File Recoverability. SCC@AsiaCCS 2017: 19-26 - [i22]Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid:
Cloud Storage File Recoverability. IACR Cryptol. ePrint Arch. 2017: 167 (2017) - [i21]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 693 (2017) - 2016
- [c23]Alex Davidson, Gregory Fenn, Carlos Cid:
A Model for Secure and Mutually Beneficial Software Vulnerability Sharing. WISCS@CCS 2016: 3-14 - [c22]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. CT-RSA 2016: 147-163 - [i20]Alex Davidson, Carlos Cid:
Computing Private Set Operations with Linear Complexities. IACR Cryptol. ePrint Arch. 2016: 108 (2016) - 2015
- [j9]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Algebraic algorithms for LWE problems. ACM Commun. Comput. Algebra 49(2): 62 (2015) - [j8]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
On the complexity of the BKW algorithm on LWE. Des. Codes Cryptogr. 74(2): 325-354 (2015) - [j7]Gordon Procter, Carlos Cid:
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes. J. Cryptol. 28(4): 769-795 (2015) - [c21]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Access Control in Publicly Verifiable Outsourced Computation. AsiaCCS 2015: 657-662 - [c20]M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa:
Picking vs. Guessing Secrets: A Game-Theoretic Analysis. CSF 2015: 243-257 - [c19]Carlos Cid, Loïc Ferreira, Gordon Procter, Matthew J. B. Robshaw:
Algebraic Cryptanalysis and RFID Authentication. RFIDSec 2015: 104-121 - [e1]Carlos Cid, Christian Rechberger:
Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8540, Springer 2015, ISBN 978-3-662-46705-3 [contents] - [i19]M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa:
Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report). CoRR abs/1505.02325 (2015) - [i18]Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid:
Multi-Client Non-Interactive Verifiable Computation. IACR Cryptol. ePrint Arch. 2015: 190 (2015) - [i17]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. IACR Cryptol. ePrint Arch. 2015: 320 (2015) - 2014
- [c18]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Revocation in Publicly Verifiable Outsourced Computation. Inscrypt 2014: 51-71 - [c17]M. H. R. Khouzani, Viet Pham, Carlos Cid:
Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments. GameSec 2014: 59-78 - [c16]Viet Pham, M. H. R. Khouzani, Carlos Cid:
Optimal Contracts for Outsourced Computation. GameSec 2014: 79-98 - [i16]James Alderman, Carlos Cid, Jason Crampton, Christian Janson:
Publicly Verifiable Outsourced Computation with a Key Distribution Centre. CoRR abs/1406.5720 (2014) - [i15]Viet Pham, M. H. R. Khouzani, Carlos Cid:
Optimal Contracts for Outsourced Computation. IACR Cryptol. ePrint Arch. 2014: 374 (2014) - [i14]James Alderman, Carlos Cid, Jason Crampton, Christian Janson:
Revocation in Publicly Verifiable Outsourced Computation. IACR Cryptol. ePrint Arch. 2014: 640 (2014) - [i13]James Alderman, Carlos Cid, Jason Crampton, Christian Janson:
Access Control in Publicly Verifiable Outsourced Computation. IACR Cryptol. ePrint Arch. 2014: 762 (2014) - [i12]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Algebraic Algorithms for LWE Problems. IACR Cryptol. ePrint Arch. 2014: 1018 (2014) - 2013
- [c15]Gordon Procter, Carlos Cid:
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes. FSE 2013: 287-304 - [c14]Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid:
Multi-Client Non-interactive Verifiable Computation. TCC 2013: 499-518 - [i11]Gordon Procter, Carlos Cid:
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes. IACR Cryptol. ePrint Arch. 2013: 144 (2013) - 2012
- [j6]Simon R. Blackburn, Carlos Cid, Ciaran Mullan:
Cryptanalysis of three matrix-based key establishment protocols. J. Math. Cryptol. 5(2): 159-168 (2012) - [j5]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret:
On the relation between the MXL family of algorithms and Gröbner basis algorithms. J. Symb. Comput. 47(8): 926-941 (2012) - [c13]Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake:
Memory Access Pattern Protection for Resource-Constrained Devices. CARDIS 2012: 188-202 - [c12]Viet Pham, Carlos Cid:
Are We Compromised? Modelling Security Assessment Games. GameSec 2012: 234-247 - [i10]Viet Pham, Carlos Cid:
Are We Compromised? Modelling Security Assessment Games. IACR Cryptol. ePrint Arch. 2012: 502 (2012) - [i9]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
On the Complexity of the BKW Algorithm on LWE. IACR Cryptol. ePrint Arch. 2012: 636 (2012) - 2011
- [c11]Martin R. Albrecht, Carlos Cid:
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. ACNS 2011: 57-72 - [c10]Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto:
Analysis of Message Injection in Stream Cipher-Based Hash Functions. ACNS 2011: 498-513 - [i8]Simon R. Blackburn, Carlos Cid, Ciaran Mullan:
Cryptanalysis of three matrix-based key establishment protocols. CoRR abs/1102.2358 (2011) - [i7]Martin R. Albrecht, Carlos Cid:
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. IACR Cryptol. ePrint Arch. 2011: 38 (2011) - [i6]Simon R. Blackburn, Carlos Cid, Ciaran Mullan:
Cryptanalysis of three matrix-based key establishment protocols. IACR Cryptol. ePrint Arch. 2011: 73 (2011) - [i5]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret:
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms. IACR Cryptol. ePrint Arch. 2011: 164 (2011) - 2010
- [j4]Keith Mayes, Carlos Cid:
The MIFARE Classic story. Inf. Secur. Tech. Rep. 15(1): 8-12 (2010) - [c9]Martin R. Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret:
Algebraic Precomputations in Differential and Integral Cryptanalysis. Inscrypt 2010: 387-403 - [c8]Sondre Rønjom, Carlos Cid:
Nonlinear Equivalence of Stream Ciphers. FSE 2010: 40-54
2000 – 2009
- 2009
- [j3]Simon R. Blackburn, Carlos Cid, Ciaran Mullan:
Cryptanalysis of the MST 3 public key cryptosystem. J. Math. Cryptol. 3(4): 321-338 (2009) - [c7]Martin R. Albrecht, Carlos Cid:
Algebraic Techniques in Differential Cryptanalysis. FSE 2009: 193-208 - [c6]Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara:
The rakaposhi Stream Cipher. ICICS 2009: 32-46 - [p1]Carlos Cid, Ralf-Philipp Weinmann:
Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases. Gröbner Bases, Coding, and Cryptography 2009: 307-327 - [i4]Simon R. Blackburn, Carlos Cid, Ciaran Mullan:
Cryptanalysis of the MST3 Public Key Cryptosystem. IACR Cryptol. ePrint Arch. 2009: 248 (2009) - 2008
- [i3]Martin R. Albrecht, Carlos Cid:
Algebraic Techniques in Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2008: 177 (2008) - 2007
- [c5]Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum:
An Analysis of the Hermes8 Stream Ciphers. ACISP 2007: 1-10 - 2006
- [b1]Carlos Cid, Sean Murphy, Matthew J. B. Robshaw:
Algebraic aspects of the advanced encryption standard. Springer 2006, ISBN 978-0-387-24363-4, pp. I-VI, 1-145 - [j2]Carlos Cid:
Recent developments in cryptographic hash functions: Security implications and future directions. Inf. Secur. Tech. Rep. 11(2): 100-107 (2006) - [i2]Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum:
An Analysis of the Hermes8 Stream Ciphers. IACR Cryptol. ePrint Arch. 2006: 269 (2006) - 2005
- [c4]Carlos Cid, Gaëtan Leurent:
An Analysis of the XSL Algorithm. ASIACRYPT 2005: 333-352 - [c3]Carlos Cid, Sean Murphy, Matthew J. B. Robshaw:
Small Scale Variants of the AES. FSE 2005: 145-162 - [c2]Carlos Cid, Sean Murphy, Matthew J. B. Robshaw:
An Algebraic Framework for Cipher Embeddings. IMACC 2005: 278-289 - 2004
- [c1]Carlos Cid:
Some Algebraic Aspects of the Advanced Encryption Standard. AES Conference 2004: 58-66 - 2003
- [i1]Simon R. Blackburn, Carlos Cid, Steven D. Galbraith:
Cryptanalysis of a Cryptosystem based on Drinfeld modules. IACR Cryptol. ePrint Arch. 2003: 223 (2003) - 2001
- [j1]Carlos Cid, Tilman Schulz:
Computation of Five-and Six-Dimensional Bieberbach Groups. Exp. Math. 10(1): 109-115 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint