[Resource Topic] 2024/1801: Investigation of the Optimal Linear Characteristics of BAKSHEESH (Full Version)
|
|
0
|
16
|
November 8, 2024
|
[Resource Topic] 2024/1782: The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
|
|
0
|
35
|
November 4, 2024
|
[Resource Topic] 2024/1776: An efficient collision attack on Castryck-Decru-Smith’s hash function
|
|
0
|
34
|
November 1, 2024
|
[Resource Topic] 2024/1770: Improved Attacks for SNOVA by Exploiting Stability under a Group Action
|
|
0
|
36
|
October 30, 2024
|
[Resource Topic] 2024/1767: ECPM Cryptanalysis Resource Estimation
|
|
0
|
33
|
October 30, 2024
|
[Resource Topic] 2024/1759: A Forgery Attack on a Code-based Signature Scheme
|
|
0
|
35
|
October 30, 2024
|
[Resource Topic] 2024/1758: A comprehensive analysis of Regev's quantum algorithm
|
|
0
|
33
|
October 30, 2024
|
[Resource Topic] 2024/1757: On the Sample Complexity of Linear Code Equivalence for all Code Rates
|
|
0
|
34
|
October 30, 2024
|
[Resource Topic] 2024/1743: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs
|
|
0
|
34
|
October 28, 2024
|
[Resource Topic] 2024/1735: The Mysteries of LRA: Roots and Progresses in Side-channel Applications
|
|
0
|
42
|
October 25, 2024
|
[Resource Topic] 2024/1722: Revisiting Fermat's Factorization Method
|
|
0
|
34
|
October 25, 2024
|
[Resource Topic] 2024/1715: OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
|
|
0
|
38
|
October 21, 2024
|
[Resource Topic] 2024/1714: Theoretical Approaches to Solving the Shortest Vector Problem in NP-Hard Lattice-Based Cryptography with Post-SUSY Theories of Quantum Gravity in Polynomial Time
|
|
0
|
53
|
October 21, 2024
|
[Resource Topic] 2024/1694: Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
|
|
0
|
37
|
October 18, 2024
|
[Resource Topic] 2024/1692: On the practicality of quantum sieving algorithms for the shortest vector problem
|
|
0
|
41
|
October 18, 2024
|
[Resource Topic] 2024/1679: Information Set Decoding for Ring-Linear Code
|
|
0
|
38
|
October 18, 2024
|
[Resource Topic] 2024/1675: Testing Robustness of Homomorphically Encrypted Split Model LLMs
|
|
0
|
36
|
October 18, 2024
|
[Resource Topic] 2024/1641: Simplification Issues of An Authentication and Key Agreement Scheme for Smart Grid
|
|
0
|
39
|
October 14, 2024
|
[Resource Topic] 2024/1616: End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem
|
|
0
|
46
|
October 11, 2024
|
[Resource Topic] 2024/1614: Related-Key Cryptanalysis of FUTURE
|
|
0
|
37
|
October 11, 2024
|
[Resource Topic] 2024/1612: On Wagner's k-Tree Algorithm Over Integers
|
|
0
|
40
|
October 11, 2024
|
[Resource Topic] 2024/1604: Predicting truncated multiple matrix congruential generators with unknown parameters
|
|
0
|
44
|
October 9, 2024
|
[Resource Topic] 2024/1598: On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices
|
|
0
|
40
|
October 9, 2024
|
[Resource Topic] 2024/1594: Bit-fixing Correlation Attacks on Goldreich's Pseudorandom Generators
|
|
0
|
37
|
October 9, 2024
|
[Resource Topic] 2024/1588: A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming''
|
|
0
|
39
|
October 8, 2024
|
[Resource Topic] 2024/1580: Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting
|
|
0
|
40
|
October 8, 2024
|
[Resource Topic] 2024/1577: Solving Multivariate Coppersmith Problems with Known Moduli
|
|
0
|
42
|
October 8, 2024
|
[Resource Topic] 2024/1570: Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis
|
|
0
|
38
|
October 8, 2024
|
[Resource Topic] 2024/1565: Fiat-Shamir in the Wild
|
|
0
|
36
|
October 5, 2024
|
[Resource Topic] 2024/1550: MAYO Key Recovery by Fixing Vinegar Seeds
|
|
0
|
39
|
October 4, 2024
|