![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections
The optimization of traffic signal control has become a significant issue concerned by the whole society with the increasingly travel demands and the rise of vehicles on roadways. As one of the mature optimiza...
-
Chapter and Conference Paper
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly \(\mathbb {F}_p\) -Based Ciphers
The emergence of advanced cryptographic protocols has promoted the developments of many applications, such as secure multi-party computation (MPC). For this reason, new symmetric-key primitives have been desig...
-
Chapter and Conference Paper
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures
With the urgency of the threat imposed by quantum computers, there is a strong interest in making the signature schemes quantum resistant. As the promising candidates to ensure post-quantum security, symmetric...
-
Chapter and Conference Paper
Diving Deep into the Preimage Security of AES-Like Hashing
Since the seminal works by Sasaki and Aoki, Meet-in-the-Middle (MITM) attacks are recognized as an effective technique for preimage and collision attacks on hash functions. At Eurocrypt 2021, Bao et al. automated...
-
Chapter and Conference Paper
Full Round Distinguishing and Key-Recovery Attacks on SAND-2
This paper presents full round distinguishing and key recovery attacks on lightweight block cipher SAND-2 with 64-bit block size and 128-bit key size, which appears to be a mixture of the AND-Rotation-XOR (AND...