[Resource Topic] 2024/877: Multiple Sampling Fast Correlation Attack on Small State Stream Ciphers with Limited Round Key Period
|
|
0
|
39
|
June 5, 2024
|
[Resource Topic] 2024/873: Cryptanalysis of Algebraic Verifiable Delay Functions
|
|
0
|
53
|
June 5, 2024
|
[Resource Topic] 2024/857: Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations
|
|
0
|
58
|
May 31, 2024
|
[Resource Topic] 2024/852: Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers
|
|
0
|
60
|
May 31, 2024
|
[Resource Topic] 2024/844: Finding Dense Submodules with Algebraic Lattice Reduction
|
|
0
|
59
|
May 31, 2024
|
[Resource Topic] 2024/810: The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
|
|
0
|
85
|
May 27, 2024
|
[Resource Topic] 2024/809: Reducing Overdefined Systems of Polynomial Equations Derived from Small Scale Variants of the AES via Data Mining Methods
|
|
0
|
81
|
May 27, 2024
|
[Resource Topic] 2024/787: A new attack against search-LWE using Diophantine approximations
|
|
0
|
58
|
May 24, 2024
|
[Resource Topic] 2024/786: Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit
|
|
0
|
59
|
May 24, 2024
|
[Resource Topic] 2024/783: Differential Cryptanalysis on Quantum Computers
|
|
0
|
53
|
May 24, 2024
|
[Resource Topic] 2024/758: Admissible Parameters for the Crossbred Algorithm and Semi-regular Sequences over Finite Fields
|
|
0
|
62
|
May 20, 2024
|
[Resource Topic] 2024/720: MQ maps are not binding - Revisiting Multivariate Blind Signatures
|
|
0
|
74
|
May 11, 2024
|
[Resource Topic] 2024/713: Analyzing Pump and jump BKZ algorithm using dynamical systems
|
|
0
|
76
|
May 10, 2024
|
[Resource Topic] 2024/712: Quantum NV Sieve on Grover for Solving Shortest Vector Problem
|
|
0
|
75
|
May 10, 2024
|
[Resource Topic] 2024/699: An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization
|
|
0
|
56
|
May 10, 2024
|
[Resource Topic] 2024/693: A Note of $\mathsf{Anemoi}$ Gröbner Bases
|
|
0
|
52
|
May 10, 2024
|
[Resource Topic] 2024/691: White-box filtering attacks breaking SEL masking: from exponential to polynomial time
|
|
0
|
63
|
May 6, 2024
|
[Resource Topic] 2024/690: PN-based Attacks in the White-box Setting
|
|
0
|
64
|
May 6, 2024
|
[Resource Topic] 2024/686: Unstructured Inversions of New Hope
|
|
0
|
64
|
May 6, 2024
|
[Resource Topic] 2024/683: A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE''
|
|
0
|
57
|
May 6, 2024
|
[Resource Topic] 2024/656: Cryptanalytic Audit of the XHash Sponge Function and its Components
|
|
0
|
71
|
April 29, 2024
|
[Resource Topic] 2024/638: A note on ``a lightweight mutual and transitive authentication mechanism for IoT network''
|
|
0
|
76
|
April 26, 2024
|
[Resource Topic] 2024/622: Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols
|
|
0
|
62
|
April 26, 2024
|
[Resource Topic] 2024/621: How to Lose Some Weight - A Practical Template Syndrome Decoding Attack
|
|
0
|
91
|
April 26, 2024
|
[Resource Topic] 2024/611: A Security Analysis of Restricted Syndrome Decoding Problems
|
|
0
|
82
|
April 22, 2024
|
[Resource Topic] 2024/601: Improved Provable Reduction of NTRU and Hypercubic Lattices
|
|
0
|
87
|
April 22, 2024
|
[Resource Topic] 2024/596: Cryptanalysis of signature schemes based on the root extraction problem over braid group
|
|
0
|
80
|
April 18, 2024
|
[Resource Topic] 2024/595: Analysis of Multivariate Encryption Schemes: Application to Dob and C*
|
|
0
|
77
|
April 18, 2024
|
[Resource Topic] 2024/592: Asymptotics for the standard block size in primal lattice attacks: second order, formally verified
|
|
0
|
81
|
April 16, 2024
|
[Resource Topic] 2024/589: Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
|
|
0
|
99
|
April 16, 2024
|