[Resource Topic] 2025/741: Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo
|
|
0
|
0
|
April 27, 2025
|
[Resource Topic] 2025/681: Quantum Periodic Distinguisher Construction: Symbolization Method and Automated Tool
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/634: Cryptography based on 2D Ray Tracing
|
|
0
|
2
|
April 11, 2025
|
[Resource Topic] 2025/615: From at Least $n/3$ to at Most $3\sqrt{n}$: Correcting the Algebraic Immunity of the Hidden Weight Bit Function
|
|
0
|
0
|
April 11, 2025
|
[Resource Topic] 2025/577: Making GCM Great Again: Toward Full Security and Longer Nonces
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/550: Exact Formula for RX-Differential Probability through Modular Addition for All Rotations
|
|
0
|
0
|
March 26, 2025
|
[Resource Topic] 2025/452: Polar Lattice Cryptography
|
|
0
|
3
|
March 12, 2025
|
[Resource Topic] 2025/437: Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing
|
|
0
|
0
|
March 8, 2025
|
[Resource Topic] 2025/414: Deimos Cipher: A High-Entropy, Secure Encryption Algorithm with Strong Diffusion and Key Sensitivity
|
|
0
|
0
|
March 5, 2025
|
[Resource Topic] 2025/411: Security of the Ascon Authenticated Encryption Mode in the Presence of Quantum Adversaries
|
|
0
|
3
|
March 4, 2025
|
[Resource Topic] 2025/403: Periodic Table of Cryptanalysis: Geometric Approach with Different Bases
|
|
0
|
1
|
March 4, 2025
|
[Resource Topic] 2025/402: Related-Key Differential and Boomerang Cryptanalysis in the Fixed-Key Model
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/387: Generic Composition: From Classical to Quantum Security
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/386: How Small Can S-boxes Be
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/383: Pencil: A Domain-Extended PRF with Full $n$-bit Security \\ for Strengthening GCM and More
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/377: HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency
|
|
0
|
4
|
March 4, 2025
|
[Resource Topic] 2025/362: Adaptively Secure Fully Homomorphic Message Authentication Code with Pre-processable Verification
|
|
0
|
1
|
March 4, 2025
|
[Resource Topic] 2025/321: Differential Cryptanalysis of the Reduced Pointer Authentication Code Function used in Arm’s FEAT_PACQARMA3 Feature
|
|
0
|
0
|
February 24, 2025
|
[Resource Topic] 2025/320: Committing Authenticated Encryption: Generic Transforms with Hash Functions
|
|
0
|
0
|
February 24, 2025
|
[Resource Topic] 2025/315: Cryptanalysis of Full SCARF
|
|
0
|
3
|
February 21, 2025
|
[Resource Topic] 2025/314: Towards Optimally Secure Deterministic Authenticated Encryption Schemes
|
|
0
|
0
|
February 21, 2025
|
[Resource Topic] 2025/308: ChiLow and ChiChi: New Constructions for Code Encryption
|
|
0
|
6
|
February 21, 2025
|
[Resource Topic] 2025/282: Transistor: a TFHE-friendly Stream Cipher
|
|
0
|
2
|
February 19, 2025
|
[Resource Topic] 2025/222: A Robust Variant of ChaCha20-Poly1305
|
|
0
|
3
|
February 14, 2025
|
[Resource Topic] 2025/213: An Innovative Lightweight Symmetric Encryption Algorithm Integrating NeoAlzette ARX S-box and XCR CSPRNG
|
|
0
|
4
|
February 13, 2025
|
[Resource Topic] 2025/197: Cryptanalysis of a nonlinear filter-based stream cipher
|
|
0
|
0
|
February 11, 2025
|
[Resource Topic] 2025/178: Improved Differential and Linear Cryptanalysis on Round-Reduced SIMON
|
|
0
|
1
|
February 7, 2025
|
[Resource Topic] 2025/160: The Nonlinear Filter Model of Stream Cipher Redivivus
|
|
0
|
1
|
February 4, 2025
|
[Resource Topic] 2025/159: A Holistic Framework for Impossible Boomerang Attacks
|
|
0
|
1
|
February 4, 2025
|
[Resource Topic] 2025/102: A practical distinguisher on the full Skyscraper permutation
|
|
0
|
0
|
January 23, 2025
|