[Resource Topic] 2024/2069: One Solves All: Exploring ChatGPT's Capabilities for Fully Automated Simple Power Analysis on Cryptosystems
|
|
0
|
1
|
December 24, 2024
|
[Resource Topic] 2024/2061: Programming Equation Systems of Arithmetization-Oriented Primitives with Constraints
|
|
0
|
0
|
December 23, 2024
|
[Resource Topic] 2024/2055: Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli
|
|
0
|
1
|
December 22, 2024
|
[Resource Topic] 2024/2054: Greedy Algorithm for Representative Sets: Applications to IVLBC and GIFT-64 in Impossible Differential Attack
|
|
0
|
0
|
December 22, 2024
|
[Resource Topic] 2024/2051: Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM
|
|
0
|
4
|
December 19, 2024
|
[Resource Topic] 2024/2046: Decompressing Dilithium's Public Key with Fewer Signatures Using Side Channel Analysis
|
|
0
|
0
|
December 19, 2024
|
[Resource Topic] 2024/2043: Efficient Error-tolerant Side-channel Attacks on GPV Signatures Based on Ordinary Least Squares Regression
|
|
0
|
1
|
December 18, 2024
|
[Resource Topic] 2024/2042: A Note on Isogeny Group Action-Based Pseudorandom Functions
|
|
0
|
2
|
December 18, 2024
|
[Resource Topic] 2024/2039: Revisiting Boomerang Attacks on Lightweight ARX and AND-RX Ciphers with Applications to KATAN, SIMON and CHAM
|
|
0
|
1
|
December 18, 2024
|
[Resource Topic] 2024/2031: Covert 19th century political intrigues of Tenerife nobility revealed by cryptanalyzing an encrypted letter
|
|
0
|
2
|
December 17, 2024
|
[Resource Topic] 2024/2030: Security Analysis of ASCON Cipher under Persistent Faults
|
|
0
|
0
|
December 15, 2024
|
[Resource Topic] 2024/2007: A Combinatorial Attack on Ternary Sparse Learning with Errors (sLWE)
|
|
0
|
1
|
December 12, 2024
|
[Resource Topic] 2024/2003: Exploring the Optimal Differential Characteristics of SM4 (Full Version): Improving Automatic Search by Including Human Insights
|
|
0
|
1
|
December 12, 2024
|
[Resource Topic] 2024/2002: Improving Differential-Neural Distinguisher For Simeck Family
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/1992: Improved Quantum Linear Attacks and Application to CAST
|
|
0
|
1
|
December 12, 2024
|
[Resource Topic] 2024/1989: Revisiting OKVS-based OPRF and PSI: Cryptanalysis and Better Construction
|
|
0
|
3
|
December 12, 2024
|
[Resource Topic] 2024/1987: Side-Channel Attack on ARADI
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/1975: Quadratic Modelings of Syndrome Decoding
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/1967: Analysis of REDOG: The Pad Thai Attack
|
|
0
|
1
|
December 6, 2024
|
[Resource Topic] 2024/1949: Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis
|
|
0
|
0
|
December 6, 2024
|
[Resource Topic] 2024/1939: Machine Learning-Based Detection of Glitch Attacks in Clock Signal Data
|
|
0
|
1
|
December 2, 2024
|
[Resource Topic] 2024/1927: ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
|
|
0
|
0
|
November 29, 2024
|
[Resource Topic] 2024/1926: Cryptanalysis of BAKSHEESH Block Cipher
|
|
0
|
0
|
November 29, 2024
|
[Resource Topic] 2024/1910: Stealth Software Trojan: Amplifying Hidden RF Side-Channels with Ultra High SNR and Data-Rate
|
|
0
|
1
|
November 25, 2024
|
[Resource Topic] 2024/1908: Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY
|
|
0
|
0
|
November 25, 2024
|
[Resource Topic] 2024/1904: An Open Source Ecosystem for Implementation Security Testing
|
|
0
|
1
|
November 25, 2024
|
[Resource Topic] 2024/1901: On the Insecurity of Bloom Filter-Based Private Set Intersections
|
|
0
|
2
|
November 25, 2024
|
[Resource Topic] 2024/1900: Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith
|
|
0
|
2
|
November 25, 2024
|
[Resource Topic] 2024/1895: A Tool for Fast and Secure LWE Parameter Selection: the FHE case
|
|
0
|
16
|
November 22, 2024
|
[Resource Topic] 2024/1892: A Comprehensive Survey on Hardware-Software co-Protection against Invasive, Non-Invasive and Interactive Security Threats
|
|
0
|
13
|
November 22, 2024
|