|
[Resource Topic] 2025/1430: Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode
|
|
0
|
17
|
August 7, 2025
|
|
[Resource Topic] 2025/1427: End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces
|
|
0
|
4
|
August 7, 2025
|
|
[Resource Topic] 2025/1418: Note: Shared Key Recovery Attack on Cascader Key Exchange Protocol
|
|
0
|
6
|
August 4, 2025
|
|
[Resource Topic] 2025/1417: A Note on the Post-Quantum Security of the Inverse Discrete Logarithm Problem
|
|
0
|
9
|
August 4, 2025
|
|
[Resource Topic] 2025/1402: Can we Speed up Information Set Decoding by Using Extension Field Structure?
|
|
0
|
3
|
August 3, 2025
|
|
[Resource Topic] 2025/1401: Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity (Full Version)
|
|
0
|
7
|
August 3, 2025
|
|
[Resource Topic] 2025/1395: A Security Comment on ``A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid''
|
|
0
|
11
|
August 1, 2025
|
|
[Resource Topic] 2025/1385: Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage
|
|
0
|
3
|
July 31, 2025
|
|
[Resource Topic] 2025/1379: Enhancing Scale and Shift Invariance in Deep Learning-based Side-channel Attacks through Equivariant Convolutional Neural Networks
|
|
0
|
10
|
July 30, 2025
|
|
[Resource Topic] 2025/1375: On the (strong) linkability of Linkable Ring Signatures
|
|
0
|
11
|
July 30, 2025
|
|
[Resource Topic] 2025/1369: Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences (Full Version)
|
|
0
|
7
|
July 28, 2025
|
|
[Resource Topic] 2025/1362: Cryptanalysis of the best HFE-LL' Constructions
|
|
0
|
14
|
July 25, 2025
|
|
[Resource Topic] 2025/1353: Introducing two ROS attack variants: breaking one-more unforgeability of BZ blind signatures
|
|
0
|
11
|
July 25, 2025
|
|
[Resource Topic] 2025/1346: Cryptanalysis of TFHE-friendly Cipher FRAST
|
|
0
|
11
|
July 25, 2025
|
|
[Resource Topic] 2025/1341: Practical Attack on All Parameters of the HPPC Signature Scheme
|
|
0
|
3
|
July 23, 2025
|
|
[Resource Topic] 2025/1339: Breaking the Twinkle Authenticated Encryption Scheme and Analyzing Its Underlying Permutation
|
|
0
|
10
|
July 23, 2025
|
|
[Resource Topic] 2025/1330: Exploring Core Monomial Prediction Further: Weak-Key Superpoly Recovery for 852-Round Trivium
|
|
0
|
4
|
July 22, 2025
|
|
[Resource Topic] 2025/1329: Cryptanalysis of a multivariate CCZ scheme
|
|
0
|
5
|
July 22, 2025
|
|
[Resource Topic] 2025/1309: SoK: Deep Learning-based Side-channel Analysis Trends and Challenges
|
|
0
|
14
|
July 19, 2025
|
|
[Resource Topic] 2025/1306: Rethinking Learning-based Symmetric Cryptanalysis: a Theoretical Perspective
|
|
0
|
10
|
July 19, 2025
|
|
[Resource Topic] 2025/1303: Bumpy RYDE: A New Hybrid Technique for Generic Rank-Metric Decoders
|
|
0
|
11
|
July 19, 2025
|
|
[Resource Topic] 2025/1293: ECTester: Reverse-engineering side-channel countermeasures of ECC implementations
|
|
0
|
9
|
July 16, 2025
|
|
[Resource Topic] 2025/1292: Improved Key Attack on the MinRank Encryption Scheme based on Matrix Codes
|
|
0
|
5
|
July 16, 2025
|
|
[Resource Topic] 2025/1291: A note on the security of the BitVM3 garbling scheme
|
|
0
|
5
|
July 16, 2025
|
|
[Resource Topic] 2025/1290: Improving the Selection Rule of Correlation Attacks for Remote Power Analysis
|
|
0
|
4
|
July 16, 2025
|
|
[Resource Topic] 2025/1284: A Hybrid Algorithm for the Regular Syndrome Decoding Problem
|
|
0
|
7
|
July 16, 2025
|
|
[Resource Topic] 2025/1282: A Novel Partial Key Exposure Attack on Common Prime RSA
|
|
0
|
13
|
July 14, 2025
|
|
[Resource Topic] 2025/1281: Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques
|
|
0
|
9
|
July 14, 2025
|
|
[Resource Topic] 2025/1270: Key Recovery from Side-Channel Power Analysis Attacks on Non-SIMD HQC Decryption
|
|
0
|
7
|
July 11, 2025
|
|
[Resource Topic] 2025/1260: Opossum Attack: Application Layer Desynchronization using Opportunistic TLS
|
|
0
|
8
|
July 11, 2025
|