|
[Resource Topic] 2025/1979: On Singh et. al.'s "Collatz Hash"
|
|
0
|
7
|
October 25, 2025
|
|
[Resource Topic] 2025/1977: Evaluating the Resistance of ARADI Against Differential Fault Attack
|
|
0
|
3
|
October 25, 2025
|
|
[Resource Topic] 2025/1976: Improved Differential Cryptanalysis of ARADI
|
|
0
|
3
|
October 25, 2025
|
|
[Resource Topic] 2025/1970: Delving into Cryptanalytic Extraction of PReLU Neural Networks
|
|
0
|
3
|
October 24, 2025
|
|
[Resource Topic] 2025/1968: TAPAS: Datasets for Learning the Learning with Errors Problem
|
|
0
|
5
|
October 22, 2025
|
|
[Resource Topic] 2025/1956: A Chosen-Ciphertext Side-Channel Attack on Shuffled CRYSTALS-Kyber
|
|
0
|
5
|
October 20, 2025
|
|
[Resource Topic] 2025/1954: Neural Leakage Model: Correlation Power Analysis with Profiled Leakage Model using Deep Neural Networks
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1945: So about that Quantum Lattice Thing: Rebuttal to "Exact Coset Sampling for Quantum Lattice Algorithms"
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1944: Architectural Leakage Analysis of Masked Cryptographic Software on RISC-V Cores
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1936: Overshooting the Threshold: ($td+n$)-Masking
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1931: Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers
|
|
0
|
1
|
October 20, 2025
|
|
[Resource Topic] 2025/1929: Cryptanalysis of a Post-Quantum Signature Scheme Based on Number-Theoretic Assumptions
|
|
0
|
0
|
October 20, 2025
|
|
[Resource Topic] 2025/1917: Embedding belief propagation within a multi-task learning model : An example on Kyber's NTT
|
|
0
|
2
|
October 17, 2025
|
|
[Resource Topic] 2025/1916: Graeffe-Based Attacks on Poseidon and NTT Lower Bounds
|
|
0
|
2
|
October 17, 2025
|
|
[Resource Topic] 2025/1914: A Note on ``Designing Anonymous Signature-Based Identity Authentication Scheme for Ocean Multilevel Transmission''
|
|
0
|
2
|
October 17, 2025
|
|
[Resource Topic] 2025/1910: Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical
|
|
0
|
0
|
October 17, 2025
|
|
[Resource Topic] 2025/1909: Weak Instances of the Inverse Matrix Code Equivalence Problem
|
|
0
|
1
|
October 17, 2025
|
|
[Resource Topic] 2025/1904: Predicting Module-Lattice Reduction
|
|
0
|
1
|
October 17, 2025
|
|
[Resource Topic] 2025/1895: Differential Fault Attacks on MQOM, Breaking the Heart of Multivariate Evaluation
|
|
0
|
2
|
October 12, 2025
|
|
[Resource Topic] 2025/1890: Cryptanalysis on Lightweight Verifiable Homomorphic Encryption
|
|
0
|
2
|
October 11, 2025
|
|
[Resource Topic] 2025/1885: Correction Fault Attack on CROSS under Unknown Bit Flips
|
|
0
|
2
|
October 11, 2025
|
|
[Resource Topic] 2025/1875: Generic-compatible distinguishers for linear regression based attacks
|
|
0
|
2
|
October 11, 2025
|
|
[Resource Topic] 2025/1868: Is the Hard-Label Cryptanalytic Model Extraction Really Polynomial?
|
|
0
|
1
|
October 9, 2025
|
|
[Resource Topic] 2025/1848: Revisiting Lattice-based Non-interactive Blind Signature
|
|
0
|
4
|
October 8, 2025
|
|
[Resource Topic] 2025/1846: The Order of Hashing in Fiat-Shamir Schemes
|
|
0
|
0
|
October 8, 2025
|
|
[Resource Topic] 2025/1838: Fault to Forge: Fault Assisted Forging Attacks on LESS Signature Scheme
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1836: On the Security of LOL-MINI and LOL-DOUBLE against Correlation Attacks
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1832: Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1830: A New Approach to Improved PNB-based Attacks on Reduced-round ChaCha and Salsa
|
|
0
|
0
|
October 8, 2025
|
|
[Resource Topic] 2025/1812: Better Bounds for Finding Fixed-Degree Isogenies via Coppersmith’s Method
|
|
0
|
0
|
October 8, 2025
|