[Resource Topic] 2024/345: An Efficient Adaptive Attack Against FESTA
|
|
0
|
33
|
February 27, 2024
|
[Resource Topic] 2024/343: Partial Differential Fault Analysis on Ascon
|
|
0
|
32
|
February 27, 2024
|
[Resource Topic] 2024/342: Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
|
|
0
|
27
|
February 27, 2024
|
[Resource Topic] 2024/337: Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme
|
|
0
|
25
|
February 27, 2024
|
[Resource Topic] 2024/334: The Impact of Reversibility on Parallel Pebbling
|
|
0
|
24
|
February 27, 2024
|
[Resource Topic] 2024/333: Practical Attack on All Parameters of the DME Signature Scheme
|
|
0
|
21
|
February 27, 2024
|
[Resource Topic] 2024/322: Theoretical Explanation and Improvement of Deep Learning-aided Cryptanalysis
|
|
0
|
24
|
February 26, 2024
|
[Resource Topic] 2024/310: A Zero-Dimensional Gröbner Basis for Poseidon
|
|
0
|
27
|
February 26, 2024
|
[Resource Topic] 2024/309: NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack
|
|
0
|
23
|
February 26, 2024
|
[Resource Topic] 2024/300: Diving Deep into the Preimage Security of AES-like Hashing
|
|
0
|
23
|
February 23, 2024
|
[Resource Topic] 2024/299: Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
|
|
0
|
18
|
February 23, 2024
|
[Resource Topic] 2024/298: New Models for the Cryptanalysis of ASCON
|
|
0
|
24
|
February 23, 2024
|
[Resource Topic] 2024/296: Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks
|
|
0
|
25
|
February 23, 2024
|
[Resource Topic] 2024/287: CAPABARA: A Combined Attack on CAPA
|
|
0
|
25
|
February 23, 2024
|
[Resource Topic] 2024/284: Practical Improvements to Statistical Ineffective Fault Attacks
|
|
0
|
24
|
February 23, 2024
|
[Resource Topic] 2024/282: A Concrete Analysis of Wagner's $k$-List Algorithm over $\mathbb{Z}_p$
|
|
0
|
22
|
February 23, 2024
|
[Resource Topic] 2024/279: Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$
|
|
0
|
22
|
February 23, 2024
|
[Resource Topic] 2024/277: Fault Attacks on UOV and Rainbow
|
|
0
|
25
|
February 19, 2024
|
[Resource Topic] 2024/276: Reduce and Prange: Revisiting Prange's Information Set Decoding for LPN and RSD
|
|
0
|
29
|
February 19, 2024
|
[Resource Topic] 2024/272: Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers
|
|
0
|
25
|
February 19, 2024
|
[Resource Topic] 2024/262: Note on the cryptanalysis of Speedy
|
|
0
|
27
|
February 19, 2024
|
[Resource Topic] 2024/255: Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
|
|
0
|
26
|
February 16, 2024
|
[Resource Topic] 2024/250: Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
|
|
0
|
31
|
February 16, 2024
|
[Resource Topic] 2024/244: Don’t Use It Twice! Solving Relaxed Linear Code Equivalence Problems
|
|
0
|
26
|
February 16, 2024
|
[Resource Topic] 2024/238: A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium
|
|
0
|
21
|
February 16, 2024
|
[Resource Topic] 2024/230: Analysis of Layered ROLLO-I
|
|
0
|
23
|
February 16, 2024
|
[Resource Topic] 2024/228: On the Untapped Potential of the Quantum FLT-based Inversion
|
|
0
|
28
|
February 16, 2024
|
[Resource Topic] 2024/222: Reducing the Number of Qubits in Quantum Factoring
|
|
0
|
28
|
February 16, 2024
|
[Resource Topic] 2024/219: Singular points of UOV and VOX
|
|
0
|
16
|
February 16, 2024
|
[Resource Topic] 2024/201: Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders
|
|
0
|
26
|
February 12, 2024
|