[Resource Topic] 2024/1547: HHL for tensor-decomposable matrices
|
|
0
|
38
|
October 4, 2024
|
[Resource Topic] 2024/1527: How to Recover the Full Plaintext of XCB
|
|
0
|
70
|
September 30, 2024
|
[Resource Topic] 2024/1525: Evaluating Leakage Attacks Against Relational Encrypted Search
|
|
0
|
48
|
September 30, 2024
|
[Resource Topic] 2024/1522: Beware of Keccak: Practical Fault Attacks on SHA-3 to Compromise Kyber and Dilithium on ARM Cortex-M Devices
|
|
0
|
48
|
September 30, 2024
|
[Resource Topic] 2024/1520: On the rough order assumption in imaginary quadratic number fields
|
|
0
|
54
|
September 30, 2024
|
[Resource Topic] 2024/1517: A Note on the SNOVA Security
|
|
0
|
47
|
September 30, 2024
|
[Resource Topic] 2024/1496: No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains
|
|
0
|
33
|
September 30, 2024
|
[Resource Topic] 2024/1491: On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud
|
|
0
|
52
|
September 24, 2024
|
[Resource Topic] 2024/1468: Dense and smooth lattices in any genus
|
|
0
|
48
|
September 21, 2024
|
[Resource Topic] 2024/1453: Breaking and Repairing SQIsign2D-East
|
|
0
|
65
|
September 18, 2024
|
[Resource Topic] 2024/1437: HierNet: A Hierarchical Deep Learning Model for SCA on Long Traces
|
|
0
|
54
|
September 14, 2024
|
[Resource Topic] 2024/1423: Towards package opening detection at power-up by monitoring thermal dissipation
|
|
0
|
65
|
September 11, 2024
|
[Resource Topic] 2024/1422: ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes
|
|
0
|
70
|
September 11, 2024
|
[Resource Topic] 2024/1411: Design issues of ``an anonymous authentication and key agreement protocol in smart living''
|
|
0
|
40
|
September 11, 2024
|
[Resource Topic] 2024/1403: Hard-Label Cryptanalytic Extraction of Neural Network Models
|
|
0
|
60
|
September 11, 2024
|
[Resource Topic] 2024/1396: Rare structures in tensor graphs - Bermuda triangles for cryptosystems based on the Tensor Isomorphism problem
|
|
0
|
51
|
September 11, 2024
|
[Resource Topic] 2024/1390: Cache Timing Leakages in Zero-Knowledge Protocols
|
|
0
|
66
|
September 4, 2024
|
[Resource Topic] 2024/1389: DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES
|
|
0
|
74
|
September 4, 2024
|
[Resource Topic] 2024/1381: Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor
|
|
0
|
57
|
September 4, 2024
|
[Resource Topic] 2024/1380: EUCLEAK
|
|
0
|
54
|
September 4, 2024
|
[Resource Topic] 2024/1374: Lifting approach against the SNOVA scheme
|
|
0
|
56
|
September 4, 2024
|
[Resource Topic] 2024/1370: ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON
|
|
0
|
56
|
September 2, 2024
|
[Resource Topic] 2024/1363: Improved Key Recovery Attacks on Reduced-Round Salsa20
|
|
0
|
60
|
August 30, 2024
|
[Resource Topic] 2024/1359: Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
|
|
0
|
59
|
August 30, 2024
|
[Resource Topic] 2024/1358: Quantum Sieving for Code-Based Cryptanalysis and Its Limitations for ISD
|
|
0
|
56
|
August 30, 2024
|
[Resource Topic] 2024/1337: Construction bent functions using the Maiorana McFarland class
|
|
0
|
42
|
August 30, 2024
|
[Resource Topic] 2024/1335: Perfect Monomial Prediction for Modular Addition
|
|
0
|
33
|
August 30, 2024
|
[Resource Topic] 2024/1332: Attacking trapdoors from matrix products
|
|
0
|
37
|
August 30, 2024
|
[Resource Topic] 2024/1331: Practical Small Private Exponent Attacks against RSA
|
|
0
|
66
|
August 26, 2024
|
[Resource Topic] 2024/1330: New Results for Coppersmith's Method from the Perspective of Sumsets Theory
|
|
0
|
67
|
August 26, 2024
|