[Resource Topic] 2024/758: Admissible Parameters for the Crossbred Algorithm and Semi-regular Sequences over Finite Fields
|
|
0
|
11
|
May 20, 2024
|
[Resource Topic] 2024/720: MQ maps are not binding - Revisiting Multivariate Blind Signatures
|
|
0
|
33
|
May 11, 2024
|
[Resource Topic] 2024/713: Analyzing Pump and jump BKZ algorithm using dynamical systems
|
|
0
|
32
|
May 10, 2024
|
[Resource Topic] 2024/712: Quantum NV Sieve on Grover for Solving Shortest Vector Problem
|
|
0
|
37
|
May 10, 2024
|
[Resource Topic] 2024/699: An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization
|
|
0
|
25
|
May 10, 2024
|
[Resource Topic] 2024/693: A Note of $\mathsf{Anemoi}$ Gröbner Bases
|
|
0
|
21
|
May 10, 2024
|
[Resource Topic] 2024/691: White-box filtering attacks breaking SEL masking: from exponential to polynomial time
|
|
0
|
26
|
May 6, 2024
|
[Resource Topic] 2024/690: PN-based Attacks in the White-box Setting
|
|
0
|
25
|
May 6, 2024
|
[Resource Topic] 2024/686: Unstructured Inversions of New Hope
|
|
0
|
20
|
May 6, 2024
|
[Resource Topic] 2024/683: A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE''
|
|
0
|
22
|
May 6, 2024
|
[Resource Topic] 2024/656: Cryptanalytic Audit of the XHash Sponge Function and its Components
|
|
0
|
34
|
April 29, 2024
|
[Resource Topic] 2024/638: A note on ``a lightweight mutual and transitive authentication mechanism for IoT network''
|
|
0
|
40
|
April 26, 2024
|
[Resource Topic] 2024/622: Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols
|
|
0
|
31
|
April 26, 2024
|
[Resource Topic] 2024/621: How to Lose Some Weight - A Practical Template Syndrome Decoding Attack
|
|
0
|
34
|
April 26, 2024
|
[Resource Topic] 2024/611: A Security Analysis of Restricted Syndrome Decoding Problems
|
|
0
|
42
|
April 22, 2024
|
[Resource Topic] 2024/601: Improved Provable Reduction of NTRU and Hypercubic Lattices
|
|
0
|
44
|
April 22, 2024
|
[Resource Topic] 2024/596: Cryptanalysis of signature schemes based on the root extraction problem over braid group
|
|
0
|
54
|
April 18, 2024
|
[Resource Topic] 2024/595: Analysis of Multivariate Encryption Schemes: Application to Dob and C*
|
|
0
|
40
|
April 18, 2024
|
[Resource Topic] 2024/592: Asymptotics for the standard block size in primal lattice attacks: second order, formally verified
|
|
0
|
45
|
April 16, 2024
|
[Resource Topic] 2024/589: Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
|
|
0
|
59
|
April 16, 2024
|
[Resource Topic] 2024/583: A Note on Quantum Algorithms for Lattice Problems
|
|
0
|
98
|
April 16, 2024
|
[Resource Topic] 2024/581: Fault Attack on SQIsign
|
|
0
|
39
|
April 16, 2024
|
[Resource Topic] 2024/578: Assessing the quality of Random Number Generators through Neural Networks
|
|
0
|
35
|
April 16, 2024
|
[Resource Topic] 2024/577: Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box
|
|
0
|
41
|
April 16, 2024
|
[Resource Topic] 2024/564: Multiple Group Action Dlogs with(out) Precomputation
|
|
0
|
39
|
April 12, 2024
|
[Resource Topic] 2024/563: A Note on Related-Tweakey Impossible Differential Attacks
|
|
0
|
36
|
April 12, 2024
|
[Resource Topic] 2024/558: Scoring the predictions: a way to improve profiling side-channel attacks
|
|
0
|
41
|
April 10, 2024
|
[Resource Topic] 2024/554: Leakage-Abuse Attacks Against Structured Encryption for SQL
|
|
0
|
43
|
April 10, 2024
|
[Resource Topic] 2024/551: Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography
|
|
0
|
41
|
April 10, 2024
|
[Resource Topic] 2024/549: Integral Attack on the Full FUTURE Block Cipher
|
|
0
|
40
|
April 10, 2024
|