[Resource Topic] 2024/1715: OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
|
|
0
|
12
|
October 21, 2024
|
[Resource Topic] 2024/1714: Theoretical Approaches to Solving the Shortest Vector Problem in NP-Hard Lattice-Based Cryptography with Post-SUSY Theories of Quantum Gravity in Polynomial Time
|
|
0
|
15
|
October 21, 2024
|
[Resource Topic] 2024/1694: Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
|
|
0
|
19
|
October 18, 2024
|
[Resource Topic] 2024/1692: On the practicality of quantum sieving algorithms for the shortest vector problem
|
|
0
|
22
|
October 18, 2024
|
[Resource Topic] 2024/1679: Information Set Decoding for Ring-Linear Code
|
|
0
|
18
|
October 18, 2024
|
[Resource Topic] 2024/1675: Testing Robustness of Homomorphically Encrypted Split Model LLMs
|
|
0
|
17
|
October 18, 2024
|
[Resource Topic] 2024/1641: Simplification Issues of An Authentication and Key Agreement Scheme for Smart Grid
|
|
0
|
26
|
October 14, 2024
|
[Resource Topic] 2024/1616: End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem
|
|
0
|
30
|
October 11, 2024
|
[Resource Topic] 2024/1614: Related-Key Cryptanalysis of FUTURE
|
|
0
|
26
|
October 11, 2024
|
[Resource Topic] 2024/1612: On Wagner's k-Tree Algorithm Over Integers
|
|
0
|
24
|
October 11, 2024
|
[Resource Topic] 2024/1604: Predicting truncated multiple matrix congruential generators with unknown parameters
|
|
0
|
27
|
October 9, 2024
|
[Resource Topic] 2024/1598: On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices
|
|
0
|
22
|
October 9, 2024
|
[Resource Topic] 2024/1594: Bit-fixing Correlation Attacks on Goldreich's Pseudorandom Generators
|
|
0
|
22
|
October 9, 2024
|
[Resource Topic] 2024/1588: A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming''
|
|
0
|
21
|
October 8, 2024
|
[Resource Topic] 2024/1580: Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting
|
|
0
|
24
|
October 8, 2024
|
[Resource Topic] 2024/1577: Solving Multivariate Coppersmith Problems with Known Moduli
|
|
0
|
21
|
October 8, 2024
|
[Resource Topic] 2024/1570: Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis
|
|
0
|
25
|
October 8, 2024
|
[Resource Topic] 2024/1565: Fiat-Shamir in the Wild
|
|
0
|
24
|
October 5, 2024
|
[Resource Topic] 2024/1550: MAYO Key Recovery by Fixing Vinegar Seeds
|
|
0
|
28
|
October 4, 2024
|
[Resource Topic] 2024/1547: HHL for tensor-decomposable matrices
|
|
0
|
26
|
October 4, 2024
|
[Resource Topic] 2024/1527: How to Recover the Full Plaintext of XCB
|
|
0
|
46
|
September 30, 2024
|
[Resource Topic] 2024/1525: Evaluating Leakage Attacks Against Relational Encrypted Search
|
|
0
|
35
|
September 30, 2024
|
[Resource Topic] 2024/1522: Beware of Keccak: Practical Fault Attacks on SHA-3 to Compromise Kyber and Dilithium on ARM Cortex-M Devices
|
|
0
|
35
|
September 30, 2024
|
[Resource Topic] 2024/1520: On the rough order assumption in imaginary quadratic number fields
|
|
0
|
41
|
September 30, 2024
|
[Resource Topic] 2024/1517: A Note on the SNOVA Security
|
|
0
|
31
|
September 30, 2024
|
[Resource Topic] 2024/1496: No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains
|
|
0
|
20
|
September 30, 2024
|
[Resource Topic] 2024/1491: On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud
|
|
0
|
39
|
September 24, 2024
|
[Resource Topic] 2024/1468: Dense and smooth lattices in any genus
|
|
0
|
36
|
September 21, 2024
|
[Resource Topic] 2024/1453: Breaking and Repairing SQIsign2D-East
|
|
0
|
51
|
September 18, 2024
|
[Resource Topic] 2024/1437: HierNet: A Hierarchical Deep Learning Model for SCA on Long Traces
|
|
0
|
44
|
September 14, 2024
|