|
[Resource Topic] 2025/1971: General Key Recovery Attack on Pointwise-Keyed Functions - Application to Alternating Moduli Weak PRFs
|
|
0
|
4
|
October 24, 2025
|
|
[Resource Topic] 2025/1960: Multiple Rows Mixers and Hsilu - A Family of Linear Layers and A Permutation with Fewer XORs
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1925: Improved Modeling for Substitution Boxes with Negative Samples and Beyond (Extended Version)
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1920: ALFOMs and the Moirai: Quantifying the Performance/Security Tradeoff for ZK-friendly Hash Functions
|
|
0
|
2
|
October 17, 2025
|
|
[Resource Topic] 2025/1918: Differential-MITM Attack on 14-round ARADI
|
|
0
|
1
|
October 17, 2025
|
|
[Resource Topic] 2025/1911: Differential Meet-in-the-Middle Attacks on Feistel Ciphers
|
|
0
|
3
|
October 17, 2025
|
|
[Resource Topic] 2025/1893: Poseidon2b: A Binary Field Version of Poseidon2
|
|
0
|
2
|
October 12, 2025
|
|
[Resource Topic] 2025/1888: HCTR2-FP and HCTR3-FP: Format-Preserving Encryption from Wide-Block Ciphers
|
|
0
|
3
|
October 11, 2025
|
|
[Resource Topic] 2025/1872: Interoperable Symmetric Message Franking
|
|
0
|
1
|
October 11, 2025
|
|
[Resource Topic] 2025/1820: On the Plaintext Awareness of AEAD Schemes
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1800: Constructions of Efficiently Implementable Boolean Functions with Provable Nonlinearity/Resiliency/Algebraic Immunity Trade-Offs
|
|
0
|
0
|
October 8, 2025
|
|
[Resource Topic] 2025/1678: Two-Key Variant of the Four-Round Cascading LRW1
|
|
0
|
0
|
September 18, 2025
|
|
[Resource Topic] 2025/1673: Strong Designated Verifier Signatures with Non-delegatability from CSIDH
|
|
0
|
1
|
September 18, 2025
|
|
[Resource Topic] 2025/1651: On the Cardinality of the Walsh Support of a Boolean Function
|
|
0
|
2
|
September 12, 2025
|
|
[Resource Topic] 2025/1632: Enhancing the DATF Technique in Differential-Linear Cryptanalysis
|
|
0
|
2
|
September 12, 2025
|
|
[Resource Topic] 2025/1603: Post-quantum Security of Key-Alternating Feistel Ciphers
|
|
0
|
2
|
September 11, 2025
|
|
[Resource Topic] 2025/1601: Meet-in-the-Middle Attacks on Full ChiLow-32
|
|
0
|
0
|
September 11, 2025
|
|
[Resource Topic] 2025/1597: The State-Test Technique on Differential Attacks: a 26-Round Attack on CRAFT and Other Applications
|
|
0
|
3
|
September 11, 2025
|
|
[Resource Topic] 2025/1586: A Note on Feedback-PRF Mode of KDF from NIST SP 800-108
|
|
0
|
1
|
September 5, 2025
|
|
[Resource Topic] 2025/1581: Cryptanalysis of ChiLow with Cube-Like Attacks
|
|
0
|
1
|
September 5, 2025
|
|
[Resource Topic] 2025/1553: Understanding Unexpected Fixed-Key Differential Behaviours: How to Avoid Major Weaknesses in Lightweight Designs (Extended Version)
|
|
0
|
1
|
September 3, 2025
|
|
[Resource Topic] 2025/1552: Minimalist Model for Impossible Differentials
|
|
0
|
1
|
September 3, 2025
|
|
[Resource Topic] 2025/1550: Revisiting Time-Space Tradeoffs in Collision Search and Decision Problems
|
|
0
|
0
|
September 3, 2025
|
|
[Resource Topic] 2025/1544: MDS Diffusion Layers for Arithmetization-Oriented Symmetric Ciphers: The Rotational-Add Construction
|
|
0
|
2
|
August 30, 2025
|
|
[Resource Topic] 2025/1543: Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs
|
|
0
|
1
|
August 30, 2025
|
|
[Resource Topic] 2025/1518: Sequential Indifferentiability of STH and EDM
|
|
0
|
1
|
August 28, 2025
|
|
[Resource Topic] 2025/1509: LEAP: High-Performance Lattice-Based Pseudorandom Number Generator
|
|
0
|
5
|
August 28, 2025
|
|
[Resource Topic] 2025/1495: Pairwise independence of AES-like block ciphers
|
|
0
|
0
|
August 28, 2025
|
|
[Resource Topic] 2025/1489: PQ-STAR: Post-Quantum Stateless Auditable Rekeying
|
|
0
|
2
|
August 20, 2025
|
|
[Resource Topic] 2025/1486: Naor-Reingold goes Beyond-the-Birthday-Bound
|
|
0
|
1
|
August 20, 2025
|