[Resource Topic] 2024/1329: Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA
|
|
0
|
62
|
August 26, 2024
|
[Resource Topic] 2024/1326: On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks
|
|
0
|
55
|
August 26, 2024
|
[Resource Topic] 2024/1324: CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher
|
|
0
|
121
|
August 26, 2024
|
[Resource Topic] 2024/1322: Revisiting a Realistic EM Side-Channel Attack on a Complex Modern SoC
|
|
0
|
65
|
August 26, 2024
|
[Resource Topic] 2024/1312: Probabilistic Data Structures in the Wild: A Security Analysis of Redis
|
|
0
|
65
|
August 23, 2024
|
[Resource Topic] 2024/1310: On the Effects of Neural Network-based Output Prediction Attacks on the Design of Symmetric-key Ciphers
|
|
0
|
64
|
August 23, 2024
|
[Resource Topic] 2024/1308: LAMA: Leakage-Abuse Attacks Against Microsoft Always Encrypted
|
|
0
|
65
|
August 23, 2024
|
[Resource Topic] 2024/1304: Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity
|
|
0
|
57
|
August 23, 2024
|
[Resource Topic] 2024/1300: SoK: 5 Years of Neural Differential Cryptanalysis
|
|
0
|
57
|
August 23, 2024
|
[Resource Topic] 2024/1297: Improved Cryptanalysis of SNOVA
|
|
0
|
65
|
August 20, 2024
|
[Resource Topic] 2024/1275: MIFARE Classic: exposing the static encrypted nonce variant
|
|
0
|
97
|
August 16, 2024
|
[Resource Topic] 2024/1272: An Improved Algorithm for Code Equivalence
|
|
0
|
65
|
August 12, 2024
|
[Resource Topic] 2024/1270: Meet-in-the-Middle Attack on 4+4 Rounds of SCARF under Single-Tweak Setting
|
|
0
|
69
|
August 12, 2024
|
[Resource Topic] 2024/1261: A Key-Recovery Attack on a Leaky Seasign Variant
|
|
0
|
72
|
August 9, 2024
|
[Resource Topic] 2024/1256: Concrete Analysis of Schnorr-type Signatures with Aborts
|
|
0
|
67
|
August 9, 2024
|
[Resource Topic] 2024/1251: EMI Shielding for Use in Side-Channel Security: Analysis, Simulation and Measurements
|
|
0
|
62
|
August 9, 2024
|
[Resource Topic] 2024/1248: A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme
|
|
0
|
64
|
August 7, 2024
|
[Resource Topic] 2024/1244: A Note on ``Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things''
|
|
0
|
70
|
August 7, 2024
|
[Resource Topic] 2024/1230: Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY
|
|
0
|
68
|
August 5, 2024
|
[Resource Topic] 2024/1229: Benchmarking Attacks on Learning with Errors
|
|
0
|
74
|
August 2, 2024
|
[Resource Topic] 2024/1214: Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks
|
|
0
|
66
|
July 31, 2024
|
[Resource Topic] 2024/1211: A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems
|
|
0
|
81
|
July 29, 2024
|
[Resource Topic] 2024/1205: Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card
|
|
0
|
64
|
July 29, 2024
|
[Resource Topic] 2024/1193: The syzygy distinguisher
|
|
0
|
74
|
July 25, 2024
|
[Resource Topic] 2024/1191: A note on ``a novel authentication protocol for IoT-enabled devices''
|
|
0
|
68
|
July 25, 2024
|
[Resource Topic] 2024/1187: STORM — Small Table Oriented Redundancy-based SCA Mitigation for AES
|
|
0
|
69
|
July 25, 2024
|
[Resource Topic] 2024/1177: Cryptanalysis of two post-quantum authenticated key agreement protocols
|
|
0
|
73
|
July 22, 2024
|
[Resource Topic] 2024/1174: Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber
|
|
0
|
66
|
July 22, 2024
|
[Resource Topic] 2024/1173: Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms
|
|
0
|
73
|
July 22, 2024
|
[Resource Topic] 2024/1169: Attacking Tropical Stickel Protocol by MILP and Heuristic Optimization Techniques
|
|
0
|
59
|
July 22, 2024
|