[Resource Topic] 2025/774: Towards a Modern LLL Implementation
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/773: Exploring Adversarial Attacks on the MaSTer Truncation Protocol
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/771: Differential Fault Attacks on TFHE-friendly cipher $\textsf{FRAST}$
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/763: The Tangent Space Attack
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/755: A Note on "CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid"
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/739: An Extended Rectangular MinRank Attack against UOV and Its Variants
|
|
0
|
1
|
April 27, 2025
|
[Resource Topic] 2025/725: Side-Channel Analysis Revisited and Evaluated
|
|
0
|
1
|
April 23, 2025
|
[Resource Topic] 2025/721: Efficient Key Recovery via Correlation Power Analysis on Scloud⁺
|
|
0
|
0
|
April 23, 2025
|
[Resource Topic] 2025/714: Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks (Full Version)
|
|
0
|
1
|
April 21, 2025
|
[Resource Topic] 2025/705: Breaking ECDSA with Two Affinely Related Nonces
|
|
0
|
10
|
April 18, 2025
|
[Resource Topic] 2025/698: Mind the Grammar: Side-Channel Analysis driven by Grammatical Evolution
|
|
0
|
1
|
April 17, 2025
|
[Resource Topic] 2025/697: A Multi-Differential Approach to Enhance Related-Key Neural Distinguishers
|
|
0
|
0
|
April 17, 2025
|
[Resource Topic] 2025/689: Neural network design options for RNG's verification
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/688: Uncertainty Estimation in Neural Network-enabled Side-channel Analysis and Links to Explainability
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/679: Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/678: Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/677: Impossible Differential Attack on SAND-128
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/674: On the Security of Two IKKR-type Code-Based Cryptosystems
|
|
0
|
0
|
April 15, 2025
|
[Resource Topic] 2025/655: Taking AI-Based Side-Channel Attacks to a New Dimension
|
|
0
|
0
|
April 13, 2025
|
[Resource Topic] 2025/654: ECDSA Cracking Methods
|
|
0
|
3
|
April 13, 2025
|
[Resource Topic] 2025/644: Attacking at non-harmonic frequencies in screaming-channel attacks
|
|
0
|
0
|
April 12, 2025
|
[Resource Topic] 2025/636: Impossible Differential Attack on SAND-64
|
|
0
|
0
|
April 11, 2025
|
[Resource Topic] 2025/632: On breaking McEliece keys using brute force
|
|
0
|
2
|
April 11, 2025
|
[Resource Topic] 2025/617: Multi-Screaming-Channel Attacks: Frequency Diversity for Enhanced Attacks
|
|
0
|
0
|
April 11, 2025
|
[Resource Topic] 2025/604: On the success rate of simple side-channel attacks against masking with unlimited attack traces
|
|
0
|
0
|
April 4, 2025
|
[Resource Topic] 2025/599: Insecurity of One Decentralized Attribute-based Signature Scheme for Social Co-governance
|
|
0
|
1
|
April 4, 2025
|
[Resource Topic] 2025/596: Highway to Hull: An Algorithm for Solving the General Matrix Code Equivalence Problem
|
|
0
|
1
|
April 4, 2025
|
[Resource Topic] 2025/595: Partial Key Exposure Attacks on UOV and Its Variants
|
|
0
|
2
|
April 4, 2025
|
[Resource Topic] 2025/589: Defeating AutoLock: From Simulation to Real-World Cache-Timing Exploits against TrustZone
|
|
0
|
0
|
April 4, 2025
|
[Resource Topic] 2025/582: Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on Dilithium
|
|
0
|
1
|
April 1, 2025
|