[Resource Topic] 2024/309: NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack
|
|
0
|
36
|
February 26, 2024
|
[Resource Topic] 2024/300: Diving Deep into the Preimage Security of AES-like Hashing
|
|
0
|
27
|
February 23, 2024
|
[Resource Topic] 2024/299: Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
|
|
0
|
29
|
February 23, 2024
|
[Resource Topic] 2024/298: New Models for the Cryptanalysis of ASCON
|
|
0
|
29
|
February 23, 2024
|
[Resource Topic] 2024/296: Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks
|
|
0
|
36
|
February 23, 2024
|
[Resource Topic] 2024/287: CAPABARA: A Combined Attack on CAPA
|
|
0
|
30
|
February 23, 2024
|
[Resource Topic] 2024/284: Practical Improvements to Statistical Ineffective Fault Attacks
|
|
0
|
27
|
February 23, 2024
|
[Resource Topic] 2024/282: A Concrete Analysis of Wagner's $k$-List Algorithm over $\mathbb{Z}_p$
|
|
0
|
27
|
February 23, 2024
|
[Resource Topic] 2024/279: Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$
|
|
0
|
26
|
February 23, 2024
|
[Resource Topic] 2024/277: Fault Attacks on UOV and Rainbow
|
|
0
|
29
|
February 19, 2024
|
[Resource Topic] 2024/276: Reduce and Prange: Revisiting Prange's Information Set Decoding for LPN and RSD
|
|
0
|
35
|
February 19, 2024
|
[Resource Topic] 2024/272: Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers
|
|
0
|
31
|
February 19, 2024
|
[Resource Topic] 2024/262: Note on the cryptanalysis of Speedy
|
|
0
|
33
|
February 19, 2024
|
[Resource Topic] 2024/255: Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
|
|
0
|
38
|
February 16, 2024
|
[Resource Topic] 2024/250: Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
|
|
0
|
36
|
February 16, 2024
|
[Resource Topic] 2024/244: Don’t Use It Twice! Solving Relaxed Linear Code Equivalence Problems
|
|
0
|
34
|
February 16, 2024
|
[Resource Topic] 2024/238: A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium
|
|
0
|
26
|
February 16, 2024
|
[Resource Topic] 2024/230: Analysis of Layered ROLLO-I
|
|
0
|
31
|
February 16, 2024
|
[Resource Topic] 2024/228: On the Untapped Potential of the Quantum FLT-based Inversion
|
|
0
|
39
|
February 16, 2024
|
[Resource Topic] 2024/222: Reducing the Number of Qubits in Quantum Factoring
|
|
0
|
37
|
February 16, 2024
|
[Resource Topic] 2024/219: Singular points of UOV and VOX
|
|
0
|
25
|
February 16, 2024
|
[Resource Topic] 2024/201: Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders
|
|
0
|
36
|
February 12, 2024
|
[Resource Topic] 2024/196: Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform
|
|
0
|
27
|
February 12, 2024
|
[Resource Topic] 2024/193: MQ Does Not Reduce to TUOV
|
|
0
|
45
|
February 9, 2024
|
[Resource Topic] 2024/186: RAD-FS - Inherent and Embedded SCA-Security in Ultra-Low Power IoTs
|
|
0
|
33
|
February 9, 2024
|
[Resource Topic] 2024/169: Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM
|
|
0
|
37
|
February 6, 2024
|
[Resource Topic] 2024/166: A Practical MinRank Attack Against VOX
|
|
0
|
35
|
February 6, 2024
|
[Resource Topic] 2024/150: SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors
|
|
0
|
40
|
February 2, 2024
|
[Resource Topic] 2024/149: Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks
|
|
0
|
33
|
February 2, 2024
|
[Resource Topic] 2024/148: Preliminary Cryptanalysis of the Biscuit Signature Scheme
|
|
0
|
34
|
February 2, 2024
|