[Resource Topic] 2024/166: A Practical MinRank Attack Against VOX
|
|
0
|
41
|
February 6, 2024
|
[Resource Topic] 2024/150: SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors
|
|
0
|
45
|
February 2, 2024
|
[Resource Topic] 2024/149: Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks
|
|
0
|
37
|
February 2, 2024
|
[Resource Topic] 2024/148: Preliminary Cryptanalysis of the Biscuit Signature Scheme
|
|
0
|
37
|
February 2, 2024
|
[Resource Topic] 2024/138: Correction Fault Attacks on Randomized CRYSTALS-Dilithium
|
|
0
|
42
|
January 31, 2024
|
[Resource Topic] 2024/135: A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks
|
|
0
|
39
|
January 31, 2024
|
[Resource Topic] 2024/127: Attacks Against the INDCPA-D Security of Exact FHE Schemes
|
|
0
|
41
|
January 30, 2024
|
[Resource Topic] 2024/124: Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks
|
|
0
|
50
|
January 29, 2024
|
[Resource Topic] 2024/117: Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes
|
|
0
|
48
|
January 29, 2024
|
[Resource Topic] 2024/116: On the practical CPAD security of “exact” and threshold FHE schemes and libraries
|
|
0
|
53
|
January 29, 2024
|
[Resource Topic] 2024/111: A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation
|
|
0
|
45
|
January 26, 2024
|
[Resource Topic] 2024/110: Cryptanalysis of the SNOVA signature scheme
|
|
0
|
43
|
January 26, 2024
|
[Resource Topic] 2024/104: AnonPSI: An Anonymity Assessment Framework for PSI
|
|
0
|
33
|
January 26, 2024
|
[Resource Topic] 2024/098: Theoretical differential fault attacks on FLIP and FiLIP
|
|
0
|
63
|
January 22, 2024
|
[Resource Topic] 2024/096: Revisiting the security analysis of SNOVA
|
|
0
|
49
|
January 22, 2024
|
[Resource Topic] 2024/080: Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions
|
|
0
|
41
|
January 19, 2024
|
[Resource Topic] 2024/072: 1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits
|
|
0
|
57
|
January 17, 2024
|
[Resource Topic] 2024/071: Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis
|
|
0
|
48
|
January 17, 2024
|
[Resource Topic] 2024/070: Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs
|
|
0
|
54
|
January 17, 2024
|
[Resource Topic] 2024/066: Exploiting the Central Reduction in Lattice-Based Cryptography
|
|
0
|
37
|
January 17, 2024
|
[Resource Topic] 2024/064: Extreme Algebraic Attacks
|
|
0
|
53
|
January 17, 2024
|
[Resource Topic] 2024/063: A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms
|
|
0
|
43
|
January 17, 2024
|
[Resource Topic] 2024/061: Partial Key Exposure Attack on Common Prime RSA
|
|
0
|
45
|
January 17, 2024
|
[Resource Topic] 2024/060: The Insecurity of Masked Comparisons: SCAs on ML-KEM’s FO-Transform
|
|
0
|
44
|
January 17, 2024
|
[Resource Topic] 2024/052: Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash
|
|
0
|
50
|
January 15, 2024
|
[Resource Topic] 2024/049: CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis
|
|
0
|
46
|
January 15, 2024
|
[Resource Topic] 2024/041: SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault
|
|
0
|
51
|
January 12, 2024
|
[Resource Topic] 2024/036: Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack
|
|
0
|
49
|
January 10, 2024
|
[Resource Topic] 2024/030: Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs
|
|
0
|
38
|
January 8, 2024
|
[Resource Topic] 2024/013: A note on ``intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era''
|
|
0
|
38
|
January 5, 2024
|