[Resource Topic] 2025/981: Algebraic Cryptanalysis of AO Primitives Based on Polynomial Decomposition Applications to Rain and Full AIM-IIIIV
|
|
0
|
5
|
June 2, 2025
|
[Resource Topic] 2025/979: Collision Attacks on Reduced RIPEMD-128
|
|
0
|
2
|
June 2, 2025
|
[Resource Topic] 2025/977: A Novel Leakage Model in OpenSSL’s Miller-Rabin Primality Test
|
|
0
|
4
|
June 2, 2025
|
[Resource Topic] 2025/954: Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails
|
|
0
|
4
|
May 26, 2025
|
[Resource Topic] 2025/950: Breaking Poseidon Challenges with Graeffe Transforms and Complexity Analysis by FFT Lower Bounds
|
|
0
|
4
|
May 26, 2025
|
[Resource Topic] 2025/940: Special Genera of Hermitian Lattices and Applications to HAWK
|
|
0
|
3
|
May 23, 2025
|
[Resource Topic] 2025/939: On the security of one certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks
|
|
0
|
2
|
May 23, 2025
|
[Resource Topic] 2025/937: Attacking Poseidon via Graeffe-Based Root-Finding over NTT-Friendly Fields
|
|
0
|
4
|
May 23, 2025
|
[Resource Topic] 2025/935: Side-channel safe conditional moves and swaps
|
|
0
|
2
|
May 23, 2025
|
[Resource Topic] 2025/928: HAWK: Having Automorphisms Weakens Key
|
|
0
|
3
|
May 23, 2025
|
[Resource Topic] 2025/903: Rock and a Hard Place: Attack Hardness in Neural Network-assisted Side Channel Analysis
|
|
0
|
4
|
May 21, 2025
|
[Resource Topic] 2025/892: Practical cryptanalysis of pseudorandom correlation generators based on quasi-Abelian syndrome decoding
|
|
0
|
3
|
May 19, 2025
|
[Resource Topic] 2025/875: Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve
|
|
0
|
0
|
May 19, 2025
|
[Resource Topic] 2025/873: Improvement of Side-Channel Attacks on Mitaka
|
|
0
|
0
|
May 19, 2025
|
[Resource Topic] 2025/869: One for All, All for One: Universal semi-agnostic quantum circuit for solving (Standard) Abelian Hidden Subgroup Problems
|
|
0
|
2
|
May 19, 2025
|
[Resource Topic] 2025/867: Side Channel Analysis in Homomorphic Encryption
|
|
0
|
3
|
May 19, 2025
|
[Resource Topic] 2025/866: Public-key Cryptography Attacks Using Adiabatic Quantum Computer
|
|
0
|
1
|
May 19, 2025
|
[Resource Topic] 2025/862: Distinguishing Full-Round AES-256 in a Ciphertext-Only Setting via Hybrid Statistical Learning
|
|
0
|
14
|
May 17, 2025
|
[Resource Topic] 2025/859: On the Provable Dual Attack for LWE by Modulus Switching
|
|
0
|
3
|
May 17, 2025
|
[Resource Topic] 2025/857: Classify Directly: A Dynamic Time SPA Classification Method Based on DTW
|
|
0
|
1
|
May 17, 2025
|
[Resource Topic] 2025/852: Neural-Inspired Advances in Integral Cryptanalysis
|
|
0
|
3
|
May 17, 2025
|
[Resource Topic] 2025/839: Correlation power analysis of LESS and CROSS
|
|
0
|
5
|
May 12, 2025
|
[Resource Topic] 2025/834: A Note on ``CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT''
|
|
0
|
3
|
May 12, 2025
|
[Resource Topic] 2025/830: Simple Power Analysis Attack on SQIsign
|
|
0
|
2
|
May 12, 2025
|
[Resource Topic] 2025/820: One Bit to Rule Them All – Imperfect Randomness Harms Lattice Signatures
|
|
0
|
5
|
May 9, 2025
|
[Resource Topic] 2025/818: An Attack on TON’s ADNL Secure Channel Protocol
|
|
0
|
5
|
May 9, 2025
|
[Resource Topic] 2025/814: Groebner Basis Cryptanalysis of Anemoi
|
|
0
|
2
|
May 9, 2025
|
[Resource Topic] 2025/811: Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4
|
|
0
|
3
|
May 9, 2025
|
[Resource Topic] 2025/802: Optimizing Key Recovery in Classic McEliece: Advanced Error Correction for Noisy Side-Channel Measurements
|
|
0
|
3
|
May 5, 2025
|
[Resource Topic] 2025/798: CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon
|
|
0
|
3
|
May 5, 2025
|