[Resource Topic] 2025/222: A Robust Variant of ChaCha20-Poly1305
|
|
0
|
1
|
February 14, 2025
|
[Resource Topic] 2025/213: An Innovative Lightweight Symmetric Encryption Algorithm Integrating NeoAlzette ARX S-box and XCR CSPRNG
|
|
0
|
1
|
February 13, 2025
|
[Resource Topic] 2025/197: Cryptanalysis of a nonlinear filter-based stream cipher
|
|
0
|
0
|
February 11, 2025
|
[Resource Topic] 2025/178: Improved Differential and Linear Cryptanalysis on Round-Reduced SIMON
|
|
0
|
0
|
February 7, 2025
|
[Resource Topic] 2025/160: The Nonlinear Filter Model of Stream Cipher Redivivus
|
|
0
|
0
|
February 4, 2025
|
[Resource Topic] 2025/159: A Holistic Framework for Impossible Boomerang Attacks
|
|
0
|
1
|
February 4, 2025
|
[Resource Topic] 2025/102: A practical distinguisher on the full Skyscraper permutation
|
|
0
|
0
|
January 23, 2025
|
[Resource Topic] 2025/058: Skyscraper: Fast Hashing on Big Primes
|
|
0
|
0
|
January 16, 2025
|
[Resource Topic] 2024/2090: Breaking the Shadow: Key Recovery Attack on Full-Round Shadow Block Ciphers with Minimal Data
|
|
0
|
0
|
December 30, 2024
|
[Resource Topic] 2024/2068: Weightwise Almost Perfectly Balanced Functions, Construction From A Permutation Group Action View
|
|
0
|
0
|
December 24, 2024
|
[Resource Topic] 2024/2053: Optimally Secure TBC Based Accordion Mode
|
|
0
|
0
|
December 22, 2024
|
[Resource Topic] 2024/2049: BBB Secure Arbitrary Length Tweak TBC from n-bit Block Ciphers
|
|
0
|
0
|
December 19, 2024
|
[Resource Topic] 2024/2045: Cryptanalysis of TETRA Encryption Algorithms - Episode 1: TEA-3
|
|
0
|
12
|
December 19, 2024
|
[Resource Topic] 2024/2033: General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES
|
|
0
|
1
|
December 17, 2024
|
[Resource Topic] 2024/2029: NLAT: the NonLinear Distribution Table of Vectorial Boolean Mappings
|
|
0
|
1
|
December 15, 2024
|
[Resource Topic] 2024/2022: The Revisited Hidden Weight Bit Function
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/1998: Impossible Differential Automation: Model Generation and New Techniques
|
|
0
|
2
|
December 12, 2024
|
[Resource Topic] 2024/1996: A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin
|
|
0
|
1
|
December 12, 2024
|
[Resource Topic] 2024/1982: New Results in Quantum Analysis of LED: Featuring One and Two Oracle Attacks
|
|
0
|
2
|
December 12, 2024
|
[Resource Topic] 2024/1980: Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs
|
|
0
|
3
|
December 12, 2024
|
[Resource Topic] 2024/1969: SoK: Security of the Ascon Modes
|
|
0
|
0
|
December 6, 2024
|
[Resource Topic] 2024/1962: uKNIT: Breaking Round-alignment for Cipher Design -- Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher
|
|
0
|
0
|
December 6, 2024
|
[Resource Topic] 2024/1928: Generic Security of GCM-SST
|
|
0
|
0
|
November 29, 2024
|
[Resource Topic] 2024/1867: Symmetric Twin Column Parity Mixers and their Applications
|
|
0
|
31
|
November 15, 2024
|
[Resource Topic] 2024/1864: Tweakable ForkCipher from Ideal Block Cipher
|
|
0
|
31
|
November 15, 2024
|
[Resource Topic] 2024/1836: Symmetric Encryption on a Quantum Computer
|
|
0
|
29
|
November 11, 2024
|
[Resource Topic] 2024/1813: Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD: More Applications of Pseudo-Random Injections
|
|
0
|
28
|
November 8, 2024
|
[Resource Topic] 2024/1795: How Fast Does the Inverse Walk Approximate a Random Permutation?
|
|
0
|
39
|
November 4, 2024
|
[Resource Topic] 2024/1772: Byte-wise equal property of ARADI
|
|
0
|
37
|
November 1, 2024
|
[Resource Topic] 2024/1755: Exponential sums in linear cryptanalysis
|
|
0
|
37
|
October 30, 2024
|