[Resource Topic] 2024/063: A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms
|
|
0
|
50
|
January 17, 2024
|
[Resource Topic] 2024/061: Partial Key Exposure Attack on Common Prime RSA
|
|
0
|
52
|
January 17, 2024
|
[Resource Topic] 2024/060: The Insecurity of Masked Comparisons: SCAs on ML-KEM’s FO-Transform
|
|
0
|
48
|
January 17, 2024
|
[Resource Topic] 2024/052: Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash
|
|
0
|
57
|
January 15, 2024
|
[Resource Topic] 2024/049: CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis
|
|
0
|
54
|
January 15, 2024
|
[Resource Topic] 2024/041: SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault
|
|
0
|
59
|
January 12, 2024
|
[Resource Topic] 2024/036: Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack
|
|
0
|
55
|
January 10, 2024
|
[Resource Topic] 2024/030: Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs
|
|
0
|
43
|
January 8, 2024
|
[Resource Topic] 2024/013: A note on ``intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era''
|
|
0
|
45
|
January 5, 2024
|
[Resource Topic] 2024/010: On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs
|
|
0
|
39
|
January 5, 2024
|
[Resource Topic] 2023/1963: A Small Serving of Mash: (Quantum) Algorithms for SPDH-Sign with Small Parameters
|
|
0
|
47
|
December 31, 2023
|
[Resource Topic] 2023/1953: Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem
|
|
0
|
61
|
December 25, 2023
|
[Resource Topic] 2023/1952: Overview and Discussion of Attacks on CRYSTALS-Kyber
|
|
0
|
82
|
December 25, 2023
|
[Resource Topic] 2023/1943: Distinguisher and Related-Key Attack on HALFLOOP-96
|
|
0
|
50
|
December 22, 2023
|
[Resource Topic] 2023/1931: Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
|
|
0
|
64
|
December 21, 2023
|
[Resource Topic] 2023/1923: Differential Fault Attack on Ascon Cipher
|
|
0
|
58
|
December 18, 2023
|
[Resource Topic] 2023/1922: One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis
|
|
0
|
48
|
December 18, 2023
|
[Resource Topic] 2023/1913: Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software
|
|
0
|
52
|
December 15, 2023
|
[Resource Topic] 2023/1904: Generalized Kotov-Ushakov Attack on Tropical Stickel Protocol Based on Modified Circulants
|
|
0
|
44
|
December 12, 2023
|
[Resource Topic] 2023/1892: Asymptotics of hybrid primal lattice attacks
|
|
0
|
68
|
December 11, 2023
|
[Resource Topic] 2023/1891: In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium
|
|
0
|
48
|
December 11, 2023
|
[Resource Topic] 2023/1883: The statistical nature of leakage in SSE schemes and its role in passive attacks
|
|
0
|
50
|
December 8, 2023
|
[Resource Topic] 2023/1880: Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work
|
|
0
|
50
|
December 7, 2023
|
[Resource Topic] 2023/1870: An Improved Method for Evaluating Secret Variables and Its Application to WAGE
|
|
0
|
61
|
December 6, 2023
|
[Resource Topic] 2023/1866: When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber
|
|
0
|
106
|
December 6, 2023
|
[Resource Topic] 2023/1864: Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses
|
|
0
|
49
|
December 6, 2023
|
[Resource Topic] 2023/1862: Analyzing UTXO-Based Blockchain Privacy Threats
|
|
0
|
45
|
December 6, 2023
|
[Resource Topic] 2023/1860: EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis
|
|
0
|
52
|
December 6, 2023
|
[Resource Topic] 2023/1850: Accurate Score Prediction for Dual-Sieve Attacks
|
|
0
|
72
|
December 4, 2023
|
[Resource Topic] 2023/1848: Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services
|
|
0
|
66
|
December 1, 2023
|