[Resource Topic] 2025/1379: Enhancing Scale and Shift Invariance in Deep Learning-based Side-channel Attacks through Equivariant Convolutional Neural Networks
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1375: On the (strong) linkability of Linkable Ring Signatures
|
|
0
|
2
|
July 30, 2025
|
[Resource Topic] 2025/1369: Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences (Full Version)
|
|
0
|
0
|
July 28, 2025
|
[Resource Topic] 2025/1362: Cryptanalysis of the best HFE-LL' Constructions
|
|
0
|
0
|
July 25, 2025
|
[Resource Topic] 2025/1353: Introducing two ROS attack variants: breaking one-more unforgeability of BZ blind signatures
|
|
0
|
1
|
July 25, 2025
|
[Resource Topic] 2025/1346: Cryptanalysis of TFHE-friendly Cipher FRAST
|
|
0
|
0
|
July 25, 2025
|
[Resource Topic] 2025/1341: Practical Attack on All Parameters of the HPPC Signature Scheme
|
|
0
|
0
|
July 23, 2025
|
[Resource Topic] 2025/1339: Breaking the Twinkle Authenticated Encryption Scheme and Analyzing Its Underlying Permutation
|
|
0
|
1
|
July 23, 2025
|
[Resource Topic] 2025/1330: Exploring Core Monomial Prediction Further: Weak-Key Superpoly Recovery for 852-Round Trivium
|
|
0
|
0
|
July 22, 2025
|
[Resource Topic] 2025/1329: Cryptanalysis of a multivariate CCZ scheme
|
|
0
|
0
|
July 22, 2025
|
[Resource Topic] 2025/1309: SoK: Deep Learning-based Side-channel Analysis Trends and Challenges
|
|
0
|
1
|
July 19, 2025
|
[Resource Topic] 2025/1306: Rethinking Learning-based Symmetric Cryptanalysis: a Theoretical Perspective
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1303: Bumpy RYDE: A New Hybrid Technique for Generic Rank-Metric Decoders
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1293: ECTester: Reverse-engineering side-channel countermeasures of ECC implementations
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1292: Improved Key Attack on the MinRank Encryption Scheme based on Matrix Codes
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1291: A note on the security of the BitVM3 garbling scheme
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1290: Improving the Selection Rule of Correlation Attacks for Remote Power Analysis
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1284: A Hybrid Algorithm for the Regular Syndrome Decoding Problem
|
|
0
|
1
|
July 16, 2025
|
[Resource Topic] 2025/1282: A Novel Partial Key Exposure Attack on Common Prime RSA
|
|
0
|
1
|
July 14, 2025
|
[Resource Topic] 2025/1281: Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques
|
|
0
|
0
|
July 14, 2025
|
[Resource Topic] 2025/1270: Key Recovery from Side-Channel Power Analysis Attacks on Non-SIMD HQC Decryption
|
|
0
|
2
|
July 11, 2025
|
[Resource Topic] 2025/1260: Opossum Attack: Application Layer Desynchronization using Opportunistic TLS
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1259: Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1257: Non-Profiled Higher-Order Side-Channel Attacks against Lattice-Based Post-Quantum Cryptography
|
|
0
|
6
|
July 11, 2025
|
[Resource Topic] 2025/1251: Black Box to Blueprint: Visualizing Leakage Propagation in Deep Learning Models for SCA
|
|
0
|
1
|
July 11, 2025
|
[Resource Topic] 2025/1250: The Weighted Sum Correlation Analysis
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1249: An Automated Model to Search For Differential Meet-In-The-Middle Attack: Applications to AndRX Ciphers
|
|
0
|
2
|
July 11, 2025
|
[Resource Topic] 2025/1248: Beyond Side-Channels: Evaluating Inner Product Masking Against SIFA
|
|
0
|
1
|
July 11, 2025
|
[Resource Topic] 2025/1242: Note: Full-round distinguisher for Synergy
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1237: Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog
|
|
0
|
13
|
July 11, 2025
|