[Resource Topic] 2024/596: Cryptanalysis of signature schemes based on the root extraction problem over braid group
|
|
0
|
13
|
April 18, 2024
|
[Resource Topic] 2024/595: Analysis of Multivariate Encryption Schemes: Application to Dob and C*
|
|
0
|
11
|
April 18, 2024
|
[Resource Topic] 2024/592: Asymptotics for the standard block size in primal lattice attacks: second order, formally verified
|
|
0
|
14
|
April 16, 2024
|
[Resource Topic] 2024/589: Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
|
|
0
|
16
|
April 16, 2024
|
[Resource Topic] 2024/583: A Note on Quantum Algorithms for Lattice Problems
|
|
0
|
69
|
April 16, 2024
|
[Resource Topic] 2024/581: Fault Attack on SQIsign
|
|
0
|
17
|
April 16, 2024
|
[Resource Topic] 2024/578: Assessing the quality of Random Number Generators through Neural Networks
|
|
0
|
15
|
April 16, 2024
|
[Resource Topic] 2024/577: Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box
|
|
0
|
16
|
April 16, 2024
|
[Resource Topic] 2024/564: Multiple Group Action Dlogs with(out) Precomputation
|
|
0
|
16
|
April 12, 2024
|
[Resource Topic] 2024/563: A Note on Related-Tweakey Impossible Differential Attacks
|
|
0
|
17
|
April 12, 2024
|
[Resource Topic] 2024/558: Scoring the predictions: a way to improve profiling side-channel attacks
|
|
0
|
20
|
April 10, 2024
|
[Resource Topic] 2024/554: Leakage-Abuse Attacks Against Structured Encryption for SQL
|
|
0
|
19
|
April 10, 2024
|
[Resource Topic] 2024/551: Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography
|
|
0
|
20
|
April 10, 2024
|
[Resource Topic] 2024/549: Integral Attack on the Full FUTURE Block Cipher
|
|
0
|
18
|
April 10, 2024
|
[Resource Topic] 2024/546: Share with Care: Breaking E2EE in Nextcloud
|
|
0
|
20
|
April 10, 2024
|
[Resource Topic] 2024/542: Breaking Bicoptor from S$\&$P 2023 Based on Practical Secret Recovery Attack
|
|
0
|
27
|
April 8, 2024
|
[Resource Topic] 2024/533: HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation
|
|
0
|
20
|
April 6, 2024
|
[Resource Topic] 2024/527: Slice more? It leaks: Analysis on the paper ``On the Feasibility of Sliced Garbling''
|
|
0
|
25
|
April 6, 2024
|
[Resource Topic] 2024/512: Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium
|
|
0
|
27
|
April 1, 2024
|
[Resource Topic] 2024/511: A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes
|
|
0
|
27
|
April 1, 2024
|
[Resource Topic] 2024/489: Guess and Determine Analysis Based on Set Split
|
|
0
|
29
|
March 27, 2024
|
[Resource Topic] 2024/488: Improving Generic Attacks Using Exceptional Functions
|
|
0
|
27
|
March 27, 2024
|
[Resource Topic] 2024/485: A Variation on Knellwolf and Meier's Attack on the Knapsack Generator
|
|
0
|
26
|
March 26, 2024
|
[Resource Topic] 2024/478: The Security of SHA2 under the Differential Fault Characteristic of Boolean Functions
|
|
0
|
30
|
March 22, 2024
|
[Resource Topic] 2024/468: Zero-Dimensional Gröbner Bases for Rescue-XLIX
|
|
0
|
34
|
March 22, 2024
|
[Resource Topic] 2024/463: Security Guidelines for Implementing Homomorphic Encryption
|
|
0
|
38
|
March 22, 2024
|
[Resource Topic] 2024/459: Isogeny problems with level structure
|
|
0
|
22
|
March 22, 2024
|
[Resource Topic] 2024/458: Classical and Quantum Generic Attacks on 6-round Feistel Schemes
|
|
0
|
20
|
March 22, 2024
|
[Resource Topic] 2024/448: Differential Cryptanalysis of a Lightweight Block Cipher LELBC
|
|
0
|
33
|
March 18, 2024
|
[Resource Topic] 2024/443: The cool and the cruel: separating hard parts of LWE secrets
|
|
0
|
29
|
March 15, 2024
|