[Resource Topic] 2024/1275: MIFARE Classic: exposing the static encrypted nonce variant
|
|
0
|
66
|
August 16, 2024
|
[Resource Topic] 2024/1272: An Improved Algorithm for Code Equivalence
|
|
0
|
52
|
August 12, 2024
|
[Resource Topic] 2024/1270: Meet-in-the-Middle Attack on 4+4 Rounds of SCARF under Single-Tweak Setting
|
|
0
|
50
|
August 12, 2024
|
[Resource Topic] 2024/1261: A Key-Recovery Attack on a Leaky Seasign Variant
|
|
0
|
57
|
August 9, 2024
|
[Resource Topic] 2024/1256: Concrete Analysis of Schnorr-type Signatures with Aborts
|
|
0
|
43
|
August 9, 2024
|
[Resource Topic] 2024/1251: EMI Shielding for Use in Side-Channel Security: Analysis, Simulation and Measurements
|
|
0
|
39
|
August 9, 2024
|
[Resource Topic] 2024/1248: A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme
|
|
0
|
47
|
August 7, 2024
|
[Resource Topic] 2024/1244: A Note on ``Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things''
|
|
0
|
52
|
August 7, 2024
|
[Resource Topic] 2024/1230: Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY
|
|
0
|
42
|
August 5, 2024
|
[Resource Topic] 2024/1229: Benchmarking Attacks on Learning with Errors
|
|
0
|
58
|
August 2, 2024
|
[Resource Topic] 2024/1214: Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks
|
|
0
|
50
|
July 31, 2024
|
[Resource Topic] 2024/1211: A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems
|
|
0
|
59
|
July 29, 2024
|
[Resource Topic] 2024/1205: Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card
|
|
0
|
48
|
July 29, 2024
|
[Resource Topic] 2024/1193: The syzygy distinguisher
|
|
0
|
60
|
July 25, 2024
|
[Resource Topic] 2024/1191: A note on ``a novel authentication protocol for IoT-enabled devices''
|
|
0
|
51
|
July 25, 2024
|
[Resource Topic] 2024/1187: STORM — Small Table Oriented Redundancy-based SCA Mitigation for AES
|
|
0
|
49
|
July 25, 2024
|
[Resource Topic] 2024/1177: Cryptanalysis of two post-quantum authenticated key agreement protocols
|
|
0
|
56
|
July 22, 2024
|
[Resource Topic] 2024/1174: Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber
|
|
0
|
51
|
July 22, 2024
|
[Resource Topic] 2024/1173: Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms
|
|
0
|
56
|
July 22, 2024
|
[Resource Topic] 2024/1169: Attacking Tropical Stickel Protocol by MILP and Heuristic Optimization Techniques
|
|
0
|
42
|
July 22, 2024
|
[Resource Topic] 2024/1168: Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel
|
|
0
|
45
|
July 22, 2024
|
[Resource Topic] 2024/1159: LaPSuS – A Lattice-Based Private Stream Aggregation Scheme under Scrutiny
|
|
0
|
48
|
July 19, 2024
|
[Resource Topic] 2024/1158: A Note on `` Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters''
|
|
0
|
47
|
July 19, 2024
|
[Resource Topic] 2024/1148: On hermitian decomposition lattices and the module-LIP problem in rank 2
|
|
0
|
50
|
July 19, 2024
|
[Resource Topic] 2024/1147: A reduction from Hawk to the principal ideal problem in a quaternion algebra
|
|
0
|
48
|
July 19, 2024
|
[Resource Topic] 2024/1144: A Note on ``Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain''
|
|
0
|
58
|
July 15, 2024
|
[Resource Topic] 2024/1137: Cryptanalysis of EagleSign
|
|
0
|
63
|
July 15, 2024
|
[Resource Topic] 2024/1136: Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3
|
|
0
|
56
|
July 15, 2024
|
[Resource Topic] 2024/1134: Exploiting signature leakages: breaking Enhanced pqsigRM
|
|
0
|
66
|
July 15, 2024
|
[Resource Topic] 2024/1125: Revisiting PACD-based Attacks on RSA-CRT
|
|
0
|
59
|
July 15, 2024
|