|
[Resource Topic] 2025/2128: Refined Linear Approximations for ARX Ciphers and Their Application to ChaCha
|
|
0
|
4
|
November 21, 2025
|
|
[Resource Topic] 2025/2117: Revisiting Simulation Extractability in the Updatable Setting
|
|
0
|
8
|
November 21, 2025
|
|
[Resource Topic] 2025/2101: Fault Attacks against UOV-based Signatures
|
|
0
|
8
|
November 17, 2025
|
|
[Resource Topic] 2025/2096: Laser Fault Injection Attack on the eXtended Merkle Signature Scheme
|
|
0
|
4
|
November 17, 2025
|
|
[Resource Topic] 2025/2090: Quantum Grover Attack on MIBS
|
|
0
|
6
|
November 14, 2025
|
|
[Resource Topic] 2025/2079: On the Dangers of RSA Exponent Transforms
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2075: Leveled Isogeny Problems with Hints
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2073: Recursion Enabled: Improved Cryptanalysis of the Permuted Kernel Problem
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2070: MIFA: An MILP-based Framework for Improving Differential Fault Attacks
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2062: Cryptanalysis of Multi-Party Key Exchange Protocols over a Modified Supertropical Semiring
|
|
0
|
3
|
November 9, 2025
|
|
[Resource Topic] 2025/2053: DIFA-Rent: Division Property Based Fault Attacks on DEFAULT and BAKSHEESH
|
|
0
|
1
|
November 9, 2025
|
|
[Resource Topic] 2025/2045: Handling Noisy Plaintext Checking Oracles with SPiRiT
|
|
0
|
8
|
November 5, 2025
|
|
[Resource Topic] 2025/2044: New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators
|
|
0
|
6
|
November 5, 2025
|
|
[Resource Topic] 2025/2043: Key-Recovery Side-Channel Attack on the Berlekamp-Massey Decoding Algorithm in the Classic McEliece KEM
|
|
0
|
8
|
November 5, 2025
|
|
[Resource Topic] 2025/2040: The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
|
|
0
|
8
|
November 5, 2025
|
|
[Resource Topic] 2025/2029: Forging Dilithium and Falcon Signatures by Single Fault Injection
|
|
0
|
7
|
November 3, 2025
|
|
[Resource Topic] 2025/2009: When Randomness Isn’t Random: Practical Fault Attack on Post-Quantum Lattice Standards
|
|
0
|
5
|
November 1, 2025
|
|
[Resource Topic] 2025/2000: Trust, But Verify When Using the Powers of Tau
|
|
0
|
4
|
October 30, 2025
|
|
[Resource Topic] 2025/1996: Turning Multiple Key-Dependent Attacks into Universal Attacks
|
|
0
|
5
|
October 30, 2025
|
|
[Resource Topic] 2025/1987: Single-Trace Key Recovery Attacks on HQC Using Valid and Invalid Ciphertexts
|
|
0
|
7
|
October 29, 2025
|
|
[Resource Topic] 2025/1979: On Singh et. al.'s "Collatz Hash"
|
|
0
|
9
|
October 25, 2025
|
|
[Resource Topic] 2025/1977: Evaluating the Resistance of ARADI Against Differential Fault Attack
|
|
0
|
5
|
October 25, 2025
|
|
[Resource Topic] 2025/1976: Improved Differential Cryptanalysis of ARADI
|
|
0
|
5
|
October 25, 2025
|
|
[Resource Topic] 2025/1970: Delving into Cryptanalytic Extraction of PReLU Neural Networks
|
|
0
|
7
|
October 24, 2025
|
|
[Resource Topic] 2025/1968: TAPAS: Datasets for Learning the Learning with Errors Problem
|
|
0
|
9
|
October 22, 2025
|
|
[Resource Topic] 2025/1956: A Chosen-Ciphertext Side-Channel Attack on Shuffled CRYSTALS-Kyber
|
|
0
|
15
|
October 20, 2025
|
|
[Resource Topic] 2025/1954: Neural Leakage Model: Correlation Power Analysis with Profiled Leakage Model using Deep Neural Networks
|
|
0
|
3
|
October 20, 2025
|
|
[Resource Topic] 2025/1945: So about that Quantum Lattice Thing: Rebuttal to "Exact Coset Sampling for Quantum Lattice Algorithms"
|
|
0
|
10
|
October 20, 2025
|
|
[Resource Topic] 2025/1944: Architectural Leakage Analysis of Masked Cryptographic Software on RISC-V Cores
|
|
0
|
3
|
October 20, 2025
|
|
[Resource Topic] 2025/1936: Overshooting the Threshold: ($td+n$)-Masking
|
|
0
|
3
|
October 20, 2025
|