[Resource Topic] 2025/1820: On the Plaintext Awareness of AEAD Schemes
|
|
0
|
0
|
October 8, 2025
|
[Resource Topic] 2025/1800: Constructions of Efficiently Implementable Boolean Functions with Provable Nonlinearity/Resiliency/Algebraic Immunity Trade-Offs
|
|
0
|
0
|
October 8, 2025
|
[Resource Topic] 2025/1678: Two-Key Variant of the Four-Round Cascading LRW1
|
|
0
|
0
|
September 18, 2025
|
[Resource Topic] 2025/1673: Strong Designated Verifier Signatures with Non-delegatability from CSIDH
|
|
0
|
0
|
September 18, 2025
|
[Resource Topic] 2025/1651: On the Cardinality of the Walsh Support of a Boolean Function
|
|
0
|
2
|
September 12, 2025
|
[Resource Topic] 2025/1632: Enhancing the DATF Technique in Differential-Linear Cryptanalysis
|
|
0
|
1
|
September 12, 2025
|
[Resource Topic] 2025/1603: Post-quantum Security of Key-Alternating Feistel Ciphers
|
|
0
|
2
|
September 11, 2025
|
[Resource Topic] 2025/1601: Meet-in-the-Middle Attacks on Full ChiLow-32
|
|
0
|
0
|
September 11, 2025
|
[Resource Topic] 2025/1597: The State-Test Technique on Differential Attacks: a 26-Round Attack on CRAFT and Other Applications
|
|
0
|
3
|
September 11, 2025
|
[Resource Topic] 2025/1586: A Note on Feedback-PRF Mode of KDF from NIST SP 800-108
|
|
0
|
1
|
September 5, 2025
|
[Resource Topic] 2025/1581: Cryptanalysis of ChiLow with Cube-Like Attacks
|
|
0
|
1
|
September 5, 2025
|
[Resource Topic] 2025/1553: Understanding Unexpected Fixed-Key Differential Behaviours: How to Avoid Major Weaknesses in Lightweight Designs (Extended Version)
|
|
0
|
1
|
September 3, 2025
|
[Resource Topic] 2025/1552: Minimalist Model for Impossible Differentials
|
|
0
|
0
|
September 3, 2025
|
[Resource Topic] 2025/1550: Revisiting Time-Space Tradeoffs in Collision Search and Decision Problems
|
|
0
|
0
|
September 3, 2025
|
[Resource Topic] 2025/1544: MDS Diffusion Layers for Arithmetization-Oriented Symmetric Ciphers: The Rotational-Add Construction
|
|
0
|
1
|
August 30, 2025
|
[Resource Topic] 2025/1543: Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs
|
|
0
|
0
|
August 30, 2025
|
[Resource Topic] 2025/1518: Sequential Indifferentiability of STH and EDM
|
|
0
|
1
|
August 28, 2025
|
[Resource Topic] 2025/1509: LEAP: High-Performance Lattice-Based Pseudorandom Number Generator
|
|
0
|
4
|
August 28, 2025
|
[Resource Topic] 2025/1495: Pairwise independence of AES-like block ciphers
|
|
0
|
0
|
August 28, 2025
|
[Resource Topic] 2025/1489: PQ-STAR: Post-Quantum Stateless Auditable Rekeying
|
|
0
|
2
|
August 20, 2025
|
[Resource Topic] 2025/1486: Naor-Reingold goes Beyond-the-Birthday-Bound
|
|
0
|
0
|
August 20, 2025
|
[Resource Topic] 2025/1481: A Camera Zoom-based Paper-Pencil Cipher Encryption Scheme atop Merkle–Hellman Knapsack Cryptosystem
|
|
0
|
0
|
August 20, 2025
|
[Resource Topic] 2025/1426: (Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks and Key Exfiltration
|
|
0
|
3
|
August 7, 2025
|
[Resource Topic] 2025/1326: New Techniques for Analyzing Differentials with Application to AES
|
|
0
|
3
|
July 22, 2025
|
[Resource Topic] 2025/1314: Blink: A Family of Low-latency Tweakable Block Ciphers
|
|
0
|
3
|
July 19, 2025
|
[Resource Topic] 2025/1265: A note on a recent attack against SPEEDY-7-192
|
|
0
|
2
|
July 11, 2025
|
[Resource Topic] 2025/1262: Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields
|
|
0
|
2
|
July 11, 2025
|
[Resource Topic] 2025/1238: Extended $c$-differential distinguishers of full $9$ and reduced-round Kuznyechik cipher
|
|
0
|
4
|
July 11, 2025
|
[Resource Topic] 2025/1235: HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks
|
|
0
|
2
|
July 9, 2025
|
[Resource Topic] 2025/1221: EWEMrl: A White-Box Secure Cipher with Longevity
|
|
0
|
4
|
July 7, 2025
|