Carlos Cid
Orcid: 0000-0001-5761-8694
According to our database1,
Carlos Cid
authored at least 57 papers
between 2001 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation.
IACR Cryptol. ePrint Arch., 2023
2022
IACR Trans. Symmetric Cryptol., 2022
2021
Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics.
Inf., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security - 23rd International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Information Security Theory and Practice, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
2015
J. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
CoRR, 2015
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
CoRR, 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
2012
J. Symb. Comput., 2012
J. Math. Cryptol., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
2011
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009
2008
2006
Recent developments in cryptographic hash functions: Security implications and future directions.
Inf. Secur. Tech. Rep., 2006
Springer, ISBN: 978-0-387-24363-4, 2006
2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
2001