[Resource Topic] 2023/1460: Rigorous Foundations for Dual Attacks in Coding Theory
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1456: The Generating Series of Support Minors MinRank Ideals
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1453: Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1450: Post-Quantum Fully Homomorphic Encryption with Group Ring Homomorphisms
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1442: Everlasting ROBOT: the Marvin Attack
|
|
0
|
7
|
September 24, 2023
|
[Resource Topic] 2023/1441: Out of the Box Testing
|
|
0
|
6
|
September 24, 2023
|
[Resource Topic] 2023/1440: Comment on Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1436: Cryptanalysis of Elisabeth-4
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1430: A note on ``ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor''
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1425: Popping “R-propping”: breaking hardness assumptions for matrix groups over F_{2^8}
|
|
0
|
6
|
September 24, 2023
|
[Resource Topic] 2023/1423: Quantum Lattice Enumeration in Limited Depth
|
|
0
|
6
|
September 24, 2023
|
[Resource Topic] 2023/1419: Improving the Rectangle Attack on GIFT-64
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1414: Differential-Linear Approximation Semi-Unconstrained Searching and Partition Tree: Application to LEA and Speck
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1408: Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques
|
|
0
|
4
|
September 24, 2023
|
[Resource Topic] 2023/1399: The supersingular Endomorphism Ring and One Endomorphism problems are equivalent
|
|
0
|
8
|
September 22, 2023
|
[Resource Topic] 2023/1397: Algebraic Attacks on Round-Reduced RAIN and Full AIM-III
|
|
0
|
6
|
September 22, 2023
|
[Resource Topic] 2023/1395: Generic SCARE: reverse engineering without knowing the algorithm nor the machine
|
|
0
|
9
|
September 22, 2023
|
[Resource Topic] 2023/1391: More Insight on Deep Learning-aided Cryptanalysis
|
|
0
|
7
|
September 22, 2023
|
[Resource Topic] 2023/1375: DeepCover DS28C36: A Hardware Vulnerability Identification and Exploitation Using T-Test and Double Laser Fault Injection
|
|
0
|
6
|
September 22, 2023
|
[Resource Topic] 2023/1359: Automated Meet-in-the-Middle Attack Goes to Feistel
|
|
0
|
18
|
September 13, 2023
|
[Resource Topic] 2023/1333: Neutrosophic Boolean Function and Rejection Sampling in Post Quantum Cryptography
|
|
0
|
14
|
September 8, 2023
|
[Resource Topic] 2023/1330: Notes on Small Private Key Attacks on Common Prime RSA
|
|
0
|
12
|
September 8, 2023
|
[Resource Topic] 2023/1314: Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24
|
|
0
|
13
|
September 4, 2023
|
[Resource Topic] 2023/1306: Single-query Quantum Hidden Shift Attacks
|
|
0
|
15
|
September 2, 2023
|
[Resource Topic] 2023/1296: A note on ``blockchain-assisted authentication and key agreement scheme for fog-based smart grid''
|
|
0
|
12
|
September 2, 2023
|
[Resource Topic] 2023/1291: On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited
|
|
0
|
23
|
August 29, 2023
|
[Resource Topic] 2023/1290: Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block Cipher
|
|
0
|
16
|
August 29, 2023
|
[Resource Topic] 2023/1286: Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory
|
|
0
|
18
|
August 28, 2023
|
[Resource Topic] 2023/1283: Algebraic Cryptanalysis of Full Ciminion
|
|
0
|
17
|
August 28, 2023
|
[Resource Topic] 2023/1266: Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach
|
|
0
|
19
|
August 24, 2023
|