|
[Resource Topic] 2025/1543: Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs
|
|
0
|
4
|
August 30, 2025
|
|
[Resource Topic] 2025/1518: Sequential Indifferentiability of STH and EDM
|
|
0
|
8
|
August 28, 2025
|
|
[Resource Topic] 2025/1509: LEAP: High-Performance Lattice-Based Pseudorandom Number Generator
|
|
0
|
8
|
August 28, 2025
|
|
[Resource Topic] 2025/1495: Pairwise independence of AES-like block ciphers
|
|
0
|
2
|
August 28, 2025
|
|
[Resource Topic] 2025/1489: PQ-STAR: Post-Quantum Stateless Auditable Rekeying
|
|
0
|
23
|
August 20, 2025
|
|
[Resource Topic] 2025/1486: Naor-Reingold goes Beyond-the-Birthday-Bound
|
|
0
|
6
|
August 20, 2025
|
|
[Resource Topic] 2025/1481: A Camera Zoom-based Paper-Pencil Cipher Encryption Scheme atop Merkle–Hellman Knapsack Cryptosystem
|
|
0
|
0
|
August 20, 2025
|
|
[Resource Topic] 2025/1426: (Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks and Key Exfiltration
|
|
0
|
6
|
August 7, 2025
|
|
[Resource Topic] 2025/1326: New Techniques for Analyzing Differentials with Application to AES
|
|
0
|
5
|
July 22, 2025
|
|
[Resource Topic] 2025/1314: Blink: A Family of Low-latency Tweakable Block Ciphers
|
|
0
|
11
|
July 19, 2025
|
|
[Resource Topic] 2025/1265: A note on a recent attack against SPEEDY-7-192
|
|
0
|
9
|
July 11, 2025
|
|
[Resource Topic] 2025/1262: Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields
|
|
0
|
5
|
July 11, 2025
|
|
[Resource Topic] 2025/1238: Extended $c$-differential distinguishers of full $9$ and reduced-round Kuznyechik cipher
|
|
0
|
8
|
July 11, 2025
|
|
[Resource Topic] 2025/1235: HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks
|
|
0
|
4
|
July 9, 2025
|
|
[Resource Topic] 2025/1221: EWEMrl: A White-Box Secure Cipher with Longevity
|
|
0
|
6
|
July 7, 2025
|
|
[Resource Topic] 2025/1217: Cymric: Short-tailed but Mighty
|
|
0
|
4
|
July 7, 2025
|
|
[Resource Topic] 2025/1183: PA1 Security on Release of Unverified Plaintext in Encrypt-then-MAC AE Schemes
|
|
0
|
5
|
June 27, 2025
|
|
[Resource Topic] 2025/1180: Cryptanalysis of HiAE
|
|
0
|
14
|
June 24, 2025
|
|
[Resource Topic] 2025/1165: Automated Analysis and Synthesis of Message Authentication Codes
|
|
0
|
11
|
June 20, 2025
|
|
[Resource Topic] 2025/1148: On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security
|
|
0
|
7
|
June 20, 2025
|
|
[Resource Topic] 2025/1133: A Note on the Rank Defect Phenomena in The Linearization Attack on Elisabeth-4
|
|
0
|
11
|
June 17, 2025
|
|
[Resource Topic] 2025/1127: KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More
|
|
0
|
16
|
June 17, 2025
|
|
[Resource Topic] 2025/1123: Cryptographic Treatment of Key Control Security -- In Light of NIST SP 800-108
|
|
0
|
14
|
June 16, 2025
|
|
[Resource Topic] 2025/1089: Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security
|
|
0
|
15
|
June 12, 2025
|
|
[Resource Topic] 2025/1059: Post-Quantum Security of Keyed Sponge-Based Constructions through a Modular Approach
|
|
0
|
5
|
June 9, 2025
|
|
[Resource Topic] 2025/1051: Synergy: A Lightweight Block Cipher with Variable Bit Rotation Feistel Network
|
|
0
|
8
|
June 6, 2025
|
|
[Resource Topic] 2025/1050: Integral Resistance of Block Ciphers with Key Whitening by Modular Addition
|
|
0
|
6
|
June 6, 2025
|
|
[Resource Topic] 2025/1031: Quasidifferential Saves Infeasible Differential: Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT
|
|
0
|
13
|
June 4, 2025
|
|
[Resource Topic] 2025/1006: Adding Feeding Forward Back to the Sponge Construction
|
|
0
|
14
|
June 2, 2025
|
|
[Resource Topic] 2025/984: AsconAEAD128 Revisited in the Multi-user Setting
|
|
0
|
5
|
June 2, 2025
|