[Resource Topic] 2025/1250: The Weighted Sum Correlation Analysis
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1249: An Automated Model to Search For Differential Meet-In-The-Middle Attack: Applications to AndRX Ciphers
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1248: Beyond Side-Channels: Evaluating Inner Product Masking Against SIFA
|
|
0
|
1
|
July 11, 2025
|
[Resource Topic] 2025/1247: Field-Tested Authentication for Quantum Key Distribution and DoS Attacks
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1246: On Round-Optimal Computational VSS
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1245: Integrating and Benchmarking KpqC in TLS/X.509
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1244: A New Bijective Pairing Alternative for Encoding Natural Numbers
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1243: Improving special cases of the computational isogeny problem
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1185: From Worst-Case Hardness of $\mathsf{NP}$ to Quantum Cryptography via Quantum Indistinguishability Obfuscation
|
|
1
|
4
|
July 11, 2025
|
[Resource Topic] 2025/1242: Note: Full-round distinguisher for Synergy
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1241: Public Key Linting for ML-KEM and ML-DSA
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1240: pracy: A Practical Compiler for Attribute-Based Encryption in Python
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1239: Improved (Again) Key Pair Generation for Falcon, BAT and Hawk
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1238: Extended $c$-differential distinguishers of full $9$ and reduced-round Kuznyechik cipher
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1237: Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog
|
|
0
|
1
|
July 11, 2025
|
[Resource Topic] 2025/1236: Exploring Marginal Guesswork with the Theorem of Berry-Esséen
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1235: HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1234: LegoLog: A configurable transparency log
|
|
0
|
1
|
July 9, 2025
|
[Resource Topic] 2025/1233: Improved Constant-Sized Polynomial Commitment Schemes Without Trusted Setup
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1232: OMIX: Offline Mixing for Scalable Self-Tallying Elections
|
|
0
|
1
|
July 9, 2025
|
[Resource Topic] 2025/1231: Compressing steganographic payloads with LLM assistance
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1230: ABE Cubed: Advanced Benchmarking Extensions for ABE Squared
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1229: NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage
|
|
0
|
1
|
July 9, 2025
|
[Resource Topic] 2025/1228: Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1227: Improved Key-recovery Attacks on ARADI
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1226: Rational Censorship Attack: Breaking Blockchain with a Blackboard
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1225: Lattice EPID with Efficient Revocation
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1224: An Update to ``Polynomial Hashing over Prime Order Fields''
|
|
0
|
1
|
July 7, 2025
|
[Resource Topic] 2025/1223: Efficient Pseudorandom Correlation Generators over $\mathbb{Z}/p^k\mathbb{Z}$
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1222: SoK: Reassessing Side-Channel Vulnerabilities and Countermeasures in PQC Implementations
|
|
0
|
0
|
July 7, 2025
|