|
[Resource Topic] 2025/1808: Look for Free Variables: Breaking MAYO through Valid Solutions
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1806: Improved Integral Attack on ChiLow-32 Exploiting the Inverse of the ChiChi Function
|
|
0
|
2
|
October 8, 2025
|
|
[Resource Topic] 2025/1797: An efficient quantum algorithm for computing $S$-units and its applications
|
|
0
|
0
|
October 8, 2025
|
|
[Resource Topic] 2025/1788: Just Guess: Improved (Quantum) Algorithm for the Underdetermined MQ problem
|
|
0
|
1
|
October 3, 2025
|
|
[Resource Topic] 2025/1779: Computing the Restricted Algebraic Immunity, and Application to Weightwise Perfectly Balanced Functions
|
|
0
|
3
|
October 3, 2025
|
|
[Resource Topic] 2025/1776: A collision attack on the LTZ hash function based on a conjecture on supersingular non-superspecial isogeny graphs of dimension 2
|
|
0
|
2
|
October 3, 2025
|
|
[Resource Topic] 2025/1754: Machine Learning and Side-Channel Attacks on Post-Quantum Cryptography
|
|
0
|
3
|
September 26, 2025
|
|
[Resource Topic] 2025/1745: Fault Attacks on MPCitH Signature Schemes
|
|
0
|
3
|
September 25, 2025
|
|
[Resource Topic] 2025/1728: Precision Strike: Targeted Misclassification of Accelerated CNNs with a Single Clock Glitch
|
|
0
|
2
|
September 23, 2025
|
|
[Resource Topic] 2025/1697: Extract Discriminative Features: Profiled Side-Channel Analysis for Cryptosystems Based on Supervised Contrastive Learning
|
|
0
|
5
|
September 18, 2025
|
|
[Resource Topic] 2025/1694: Lattice Reduction via Dense Sublattices: A Cryptanalytic No-Go
|
|
0
|
6
|
September 18, 2025
|
|
[Resource Topic] 2025/1690: A Tight Quantum Algorithm for Multiple Collision Search
|
|
0
|
6
|
September 18, 2025
|
|
[Resource Topic] 2025/1670: Mixderive: A New Framework of Deriving Linear Approximations and Improved Differential-Linear Distinguishers for ChaCha
|
|
0
|
2
|
September 18, 2025
|
|
[Resource Topic] 2025/1667: Persistence of Hourglass(-like) Structure: Improved Differential-Linear Distinguishers for Several ARX Ciphers
|
|
0
|
1
|
September 17, 2025
|
|
[Resource Topic] 2025/1664: Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization
|
|
0
|
1
|
September 17, 2025
|
|
[Resource Topic] 2025/1648: Breaking Full ChiLow-32
|
|
0
|
1
|
September 12, 2025
|
|
[Resource Topic] 2025/1643: SCA-GPT: Generation-Plan-Tool Assisted LLM Agent for Full-Automated Side-Channel Analysis on Cryptosystems
|
|
0
|
2
|
September 12, 2025
|
|
[Resource Topic] 2025/1636: Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost?
|
|
0
|
4
|
September 12, 2025
|
|
[Resource Topic] 2025/1627: IND-CPA-D of Relaxed Functional Bootstrapping: A New Attack, A General Fix, and A Stronger Model
|
|
0
|
1
|
September 12, 2025
|
|
[Resource Topic] 2025/1610: BunnyFinder: Finding Incentive Flaws for Ethereum Consensus
|
|
0
|
2
|
September 11, 2025
|
|
[Resource Topic] 2025/1608: Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates
|
|
0
|
1
|
September 11, 2025
|
|
[Resource Topic] 2025/1602: Attacks on PRISM-id via Torsion over Small Extension Fields
|
|
0
|
2
|
September 11, 2025
|
|
[Resource Topic] 2025/1577: A Template SCA Attack on the Kyber/ML-KEM Pair-Pointwise Multiplication
|
|
0
|
2
|
September 5, 2025
|
|
[Resource Topic] 2025/1559: A New Generalized Lattice Attack Against a Family of RSA-Like Cryptosystems
|
|
0
|
2
|
September 3, 2025
|
|
[Resource Topic] 2025/1542: SAT-Based Space Partitioning and Applications to Ascon-Hash256
|
|
0
|
4
|
August 30, 2025
|
|
[Resource Topic] 2025/1541: Adaptive Attack on Static POKÉ Keys
|
|
0
|
1
|
August 30, 2025
|
|
[Resource Topic] 2025/1531: Improved Semi-Free-Start Collision Attacks on RIPEMD-160 (Full Version)
|
|
0
|
4
|
August 30, 2025
|
|
[Resource Topic] 2025/1525: Making Hard Problems Easier with Custom Data Distributions and Loss Regularization: A Case Study in Modular Arithmetic
|
|
0
|
1
|
August 30, 2025
|
|
[Resource Topic] 2025/1523: Decoupling Support Enumeration and Value Discovery in Non-Binary ISD
|
|
0
|
1
|
August 28, 2025
|
|
[Resource Topic] 2025/1506: Superposition Attacks Against LPN-Based Authentication Protocols
|
|
0
|
3
|
August 28, 2025
|