|
[Resource Topic] 2025/1694: Lattice Reduction via Dense Sublattices: A Cryptanalytic No-Go
|
|
0
|
8
|
September 18, 2025
|
|
[Resource Topic] 2025/1690: A Tight Quantum Algorithm for Multiple Collision Search
|
|
0
|
13
|
September 18, 2025
|
|
[Resource Topic] 2025/1670: Mixderive: A New Framework of Deriving Linear Approximations and Improved Differential-Linear Distinguishers for ChaCha
|
|
0
|
12
|
September 18, 2025
|
|
[Resource Topic] 2025/1667: Persistence of Hourglass(-like) Structure: Improved Differential-Linear Distinguishers for Several ARX Ciphers
|
|
0
|
21
|
September 17, 2025
|
|
[Resource Topic] 2025/1664: Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization
|
|
0
|
11
|
September 17, 2025
|
|
[Resource Topic] 2025/1648: Breaking Full ChiLow-32
|
|
0
|
8
|
September 12, 2025
|
|
[Resource Topic] 2025/1643: SCA-GPT: Generation-Plan-Tool Assisted LLM Agent for Full-Automated Side-Channel Analysis on Cryptosystems
|
|
0
|
13
|
September 12, 2025
|
|
[Resource Topic] 2025/1636: Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost?
|
|
0
|
16
|
September 12, 2025
|
|
[Resource Topic] 2025/1627: IND-CPA-D of Relaxed Functional Bootstrapping: A New Attack, A General Fix, and A Stronger Model
|
|
0
|
17
|
September 12, 2025
|
|
[Resource Topic] 2025/1610: BunnyFinder: Finding Incentive Flaws for Ethereum Consensus
|
|
0
|
5
|
September 11, 2025
|
|
[Resource Topic] 2025/1608: Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates
|
|
0
|
4
|
September 11, 2025
|
|
[Resource Topic] 2025/1602: Attacks on PRISM-id via Torsion over Small Extension Fields
|
|
0
|
5
|
September 11, 2025
|
|
[Resource Topic] 2025/1577: A Template SCA Attack on the Kyber/ML-KEM Pair-Pointwise Multiplication
|
|
0
|
8
|
September 5, 2025
|
|
[Resource Topic] 2025/1559: A New Generalized Lattice Attack Against a Family of RSA-Like Cryptosystems
|
|
0
|
10
|
September 3, 2025
|
|
[Resource Topic] 2025/1542: SAT-Based Space Partitioning and Applications to Ascon-Hash256
|
|
0
|
12
|
August 30, 2025
|
|
[Resource Topic] 2025/1541: Adaptive Attack on Static POKÉ Keys
|
|
0
|
5
|
August 30, 2025
|
|
[Resource Topic] 2025/1531: Improved Semi-Free-Start Collision Attacks on RIPEMD-160 (Full Version)
|
|
0
|
13
|
August 30, 2025
|
|
[Resource Topic] 2025/1525: Making Hard Problems Easier with Custom Data Distributions and Loss Regularization: A Case Study in Modular Arithmetic
|
|
0
|
6
|
August 30, 2025
|
|
[Resource Topic] 2025/1523: Decoupling Support Enumeration and Value Discovery in Non-Binary ISD
|
|
0
|
6
|
August 28, 2025
|
|
[Resource Topic] 2025/1506: Superposition Attacks Against LPN-Based Authentication Protocols
|
|
0
|
5
|
August 28, 2025
|
|
[Resource Topic] 2025/1498: One More Pair, More Information Gained: Improved Attacks on LowMC with Full S-box Layers Using Two Plaintext/Ciphertext Pairs
|
|
0
|
7
|
August 28, 2025
|
|
[Resource Topic] 2025/1496: Noise-Tolerant Plaintext-Checking Oracle Attacks -- A Soft-Analytic Approach Applied to ML-KEM
|
|
0
|
10
|
August 28, 2025
|
|
[Resource Topic] 2025/1480: SoK: Kleptographic Attacks
|
|
0
|
10
|
August 20, 2025
|
|
[Resource Topic] 2025/1476: AGB 2.0: Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications
|
|
0
|
8
|
August 20, 2025
|
|
[Resource Topic] 2025/1459: Not in The Prophecies: Practical Attacks on Nostr
|
|
0
|
5
|
August 13, 2025
|
|
[Resource Topic] 2025/1452: Not Easy to Prepare a Pesto: Cryptanalysis of a Multivariate Public-Key Scheme from CCZ Equivalence
|
|
0
|
6
|
August 12, 2025
|
|
[Resource Topic] 2025/1445: Forgery Attack on a Secure Data Sharing for Industrial IoT
|
|
0
|
5
|
August 12, 2025
|
|
[Resource Topic] 2025/1443: Generic Partial Decryption as Feature Engineering for Neural Distinguishers
|
|
0
|
4
|
August 12, 2025
|
|
[Resource Topic] 2025/1439: A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups
|
|
0
|
12
|
August 8, 2025
|
|
[Resource Topic] 2025/1435: Weak Keys in QC-MDPC-based cryptosystems via the Extended Euclidean Algorithm
|
|
0
|
6
|
August 7, 2025
|