[Resource Topic] 2025/839: Correlation power analysis of LESS and CROSS
|
|
0
|
2
|
May 12, 2025
|
[Resource Topic] 2025/834: A Note on ``CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT''
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/830: Simple Power Analysis Attack on SQIsign
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/820: One Bit to Rule Them All – Imperfect Randomness Harms Lattice Signatures
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/818: An Attack on TON’s ADNL Secure Channel Protocol
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/814: Groebner Basis Cryptanalysis of Anemoi
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/811: Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/802: Optimizing Key Recovery in Classic McEliece: Advanced Error Correction for Noisy Side-Channel Measurements
|
|
0
|
1
|
May 5, 2025
|
[Resource Topic] 2025/798: CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/792: A Scrutiny of the Security of AES-based Hashing and One-way Functions
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/791: Analysis of One Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/789: Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations
|
|
0
|
2
|
May 5, 2025
|
[Resource Topic] 2025/774: Towards a Modern LLL Implementation
|
|
0
|
1
|
April 30, 2025
|
[Resource Topic] 2025/773: Exploring Adversarial Attacks on the MaSTer Truncation Protocol
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/771: Differential Fault Attacks on TFHE-friendly cipher $\textsf{FRAST}$
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/763: The Tangent Space Attack
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/755: A Note on "CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid"
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/739: An Extended Rectangular MinRank Attack against UOV and Its Variants
|
|
0
|
1
|
April 27, 2025
|
[Resource Topic] 2025/725: Side-Channel Analysis Revisited and Evaluated
|
|
0
|
1
|
April 23, 2025
|
[Resource Topic] 2025/721: Efficient Key Recovery via Correlation Power Analysis on Scloud⁺
|
|
0
|
0
|
April 23, 2025
|
[Resource Topic] 2025/714: Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks (Full Version)
|
|
0
|
1
|
April 21, 2025
|
[Resource Topic] 2025/705: Breaking ECDSA with Two Affinely Related Nonces
|
|
0
|
11
|
April 18, 2025
|
[Resource Topic] 2025/698: Mind the Grammar: Side-Channel Analysis driven by Grammatical Evolution
|
|
0
|
1
|
April 17, 2025
|
[Resource Topic] 2025/697: A Multi-Differential Approach to Enhance Related-Key Neural Distinguishers
|
|
0
|
0
|
April 17, 2025
|
[Resource Topic] 2025/689: Neural network design options for RNG's verification
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/688: Uncertainty Estimation in Neural Network-enabled Side-channel Analysis and Links to Explainability
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/679: Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/678: Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/677: Impossible Differential Attack on SAND-128
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/674: On the Security of Two IKKR-type Code-Based Cryptosystems
|
|
0
|
0
|
April 15, 2025
|