[Resource Topic] 2025/428: On Improved Cryptanalytic Results against ChaCha for Reduced Rounds ≥ 7
|
|
0
|
0
|
March 5, 2025
|
[Resource Topic] 2025/425: A Note on the Blindness of the Scheme from ePrint 2025/397
|
|
0
|
0
|
March 5, 2025
|
[Resource Topic] 2025/415: On the Soundness of Algebraic Attacks against Code-based Assumptions
|
|
0
|
1
|
March 5, 2025
|
[Resource Topic] 2025/396: Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/380: A New Generalized Attack on RSA-like Cryptosystems
|
|
0
|
5
|
March 4, 2025
|
[Resource Topic] 2025/378: Side-Channel and Fault Injection Attacks on VOLEitH Signature Schemes: A Case Study of Masked FAEST
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/376: Another Look at the Quantum Security of the Vectorization Problem with Shifted Inputs
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/369: Higher Residuosity Attacks on Small RSA Subgroup Decision Problems
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/359: A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol
|
|
0
|
1
|
March 4, 2025
|
[Resource Topic] 2025/351: Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure
|
|
0
|
0
|
February 25, 2025
|
[Resource Topic] 2025/319: Single Trace Side-Channel Vulnerabilities Discovery Using Statistical Leakage Simulator
|
|
0
|
2
|
February 24, 2025
|
[Resource Topic] 2025/306: Dimensional e$\mathsf{ROS}$ion: Improving the $\mathsf{ROS}$ Attack with Decomposition in Higher Bases
|
|
0
|
2
|
February 21, 2025
|
[Resource Topic] 2025/304: Lattice-based Cryptography: A survey on the security of the lattice-based NIST finalists
|
|
0
|
2
|
February 21, 2025
|
[Resource Topic] 2025/289: Significantly Improved Cryptanalysis of Salsa20 With Two-Round Criteria
|
|
0
|
0
|
February 20, 2025
|
[Resource Topic] 2025/288: How to Securely Implement Cryptography in Deep Neural Networks
|
|
0
|
5
|
February 20, 2025
|
[Resource Topic] 2025/287: A reduction from Hawk to the principal ideal problem in a quaternion algebra
|
|
0
|
0
|
February 20, 2025
|
[Resource Topic] 2025/280: Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes
|
|
0
|
2
|
February 19, 2025
|
[Resource Topic] 2025/276: Finding and Protecting the Weakest Link: On Side-Channel Attacks on Masked ML-DSA
|
|
0
|
1
|
February 18, 2025
|
[Resource Topic] 2025/266: Memory-Efficient BKW Algorithm for Solving the LWE Problem
|
|
0
|
0
|
February 18, 2025
|
[Resource Topic] 2025/259: Improved Resultant Attack against Arithmetization-Oriented Primitives
|
|
0
|
1
|
February 18, 2025
|
[Resource Topic] 2025/248: New Exchanged Boomerang Distinguishers for 5-Round AES
|
|
0
|
2
|
February 17, 2025
|
[Resource Topic] 2025/227: Two Is All It Takes: Asymptotic and Concrete Improvements for Solving Code Equivalence
|
|
0
|
0
|
February 17, 2025
|
[Resource Topic] 2025/226: Improved Subfield Curve Search For Specific Field Characteristics
|
|
0
|
2
|
February 17, 2025
|
[Resource Topic] 2025/206: Revisiting the Differential-Linear Attacks on ChaCha from IEEE TIT and INDOCRYPT 2024 (Extended Abstract)
|
|
0
|
0
|
February 12, 2025
|
[Resource Topic] 2025/195: Finding a polytope: A practical fault attack against Dilithium
|
|
0
|
2
|
February 11, 2025
|
[Resource Topic] 2025/187: Asymptotic improvements to provable algorithms for the code equivalence problem
|
|
0
|
2
|
February 10, 2025
|
[Resource Topic] 2025/185: AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
|
|
0
|
1
|
February 10, 2025
|
[Resource Topic] 2025/167: Wiretapping LLMs: Network Side-Channel Attacks on Interactive LLM Services
|
|
0
|
2
|
February 5, 2025
|
[Resource Topic] 2025/162: Learning from Functionality Outputs: Private Join and Compute in the Real World
|
|
0
|
0
|
February 5, 2025
|
[Resource Topic] 2025/158: Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool
|
|
0
|
2
|
February 3, 2025
|