|
[Resource Topic] 2025/1931: Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers
|
|
0
|
12
|
October 20, 2025
|
|
[Resource Topic] 2025/1929: Cryptanalysis of a Post-Quantum Signature Scheme Based on Number-Theoretic Assumptions
|
|
0
|
14
|
October 20, 2025
|
|
[Resource Topic] 2025/1917: Embedding belief propagation within a multi-task learning model : An example on Kyber's NTT
|
|
0
|
7
|
October 17, 2025
|
|
[Resource Topic] 2025/1916: Graeffe-Based Attacks on Poseidon and NTT Lower Bounds
|
|
0
|
3
|
October 17, 2025
|
|
[Resource Topic] 2025/1914: A Note on ``Designing Anonymous Signature-Based Identity Authentication Scheme for Ocean Multilevel Transmission''
|
|
0
|
6
|
October 17, 2025
|
|
[Resource Topic] 2025/1910: Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical
|
|
0
|
1
|
October 17, 2025
|
|
[Resource Topic] 2025/1909: Weak Instances of the Inverse Matrix Code Equivalence Problem
|
|
0
|
9
|
October 17, 2025
|
|
[Resource Topic] 2025/1904: Predicting Module-Lattice Reduction
|
|
0
|
11
|
October 17, 2025
|
|
[Resource Topic] 2025/1895: Differential Fault Attacks on MQOM, Breaking the Heart of Multivariate Evaluation
|
|
0
|
8
|
October 12, 2025
|
|
[Resource Topic] 2025/1890: Cryptanalysis on Lightweight Verifiable Homomorphic Encryption
|
|
0
|
7
|
October 11, 2025
|
|
[Resource Topic] 2025/1885: Correction Fault Attack on CROSS under Unknown Bit Flips
|
|
0
|
13
|
October 11, 2025
|
|
[Resource Topic] 2025/1875: Generic-compatible distinguishers for linear regression based attacks
|
|
0
|
3
|
October 11, 2025
|
|
[Resource Topic] 2025/1868: Is the Hard-Label Cryptanalytic Model Extraction Really Polynomial?
|
|
0
|
6
|
October 9, 2025
|
|
[Resource Topic] 2025/1848: Revisiting Lattice-based Non-interactive Blind Signature
|
|
0
|
6
|
October 8, 2025
|
|
[Resource Topic] 2025/1846: The Order of Hashing in Fiat-Shamir Schemes
|
|
0
|
5
|
October 8, 2025
|
|
[Resource Topic] 2025/1838: Fault to Forge: Fault Assisted Forging Attacks on LESS Signature Scheme
|
|
0
|
4
|
October 8, 2025
|
|
[Resource Topic] 2025/1836: On the Security of LOL-MINI and LOL-DOUBLE against Correlation Attacks
|
|
0
|
7
|
October 8, 2025
|
|
[Resource Topic] 2025/1832: Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare
|
|
0
|
4
|
October 8, 2025
|
|
[Resource Topic] 2025/1830: A New Approach to Improved PNB-based Attacks on Reduced-round ChaCha and Salsa
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1812: Better Bounds for Finding Fixed-Degree Isogenies via Coppersmith’s Method
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1808: Look for Free Variables: Breaking MAYO through Valid Solutions
|
|
0
|
5
|
October 8, 2025
|
|
[Resource Topic] 2025/1806: Improved Integral Attack on ChiLow-32 Exploiting the Inverse of the ChiChi Function
|
|
0
|
6
|
October 8, 2025
|
|
[Resource Topic] 2025/1797: An efficient quantum algorithm for computing $S$-units and its applications
|
|
0
|
4
|
October 8, 2025
|
|
[Resource Topic] 2025/1788: Just Guess: Improved (Quantum) Algorithm for the Underdetermined MQ problem
|
|
0
|
2
|
October 3, 2025
|
|
[Resource Topic] 2025/1779: Computing the Restricted Algebraic Immunity, and Application to Weightwise Perfectly Balanced Functions
|
|
0
|
4
|
October 3, 2025
|
|
[Resource Topic] 2025/1776: A collision attack on the LTZ hash function based on a conjecture on supersingular non-superspecial isogeny graphs of dimension 2
|
|
0
|
8
|
October 3, 2025
|
|
[Resource Topic] 2025/1754: Machine Learning and Side-Channel Attacks on Post-Quantum Cryptography
|
|
0
|
4
|
September 26, 2025
|
|
[Resource Topic] 2025/1745: Fault Attacks on MPCitH Signature Schemes
|
|
0
|
3
|
September 25, 2025
|
|
[Resource Topic] 2025/1728: Precision Strike: Targeted Misclassification of Accelerated CNNs with a Single Clock Glitch
|
|
0
|
5
|
September 23, 2025
|
|
[Resource Topic] 2025/1697: Extract Discriminative Features: Profiled Side-Channel Analysis for Cryptosystems Based on Supervised Contrastive Learning
|
|
0
|
12
|
September 18, 2025
|