Synthical
Your space
Profile
Favorites
Folders
Feeds
All articles
Attacks and Cryptanalysis | Synthical
Articles about
Attacks and Cryptanalysis
Entropy Suffices for Guessing Most Keys
7 March 2024 by
Timo Glaser
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
The supersingular Endomorphism Ring and One Endomorphism problems are equivalent
7 March 2024 by
Aurel Page
and
Benjamin Wesolowski
Cryptography and Security
,
Attacks and Cryptanalysis
Don’t Use It Twice! Solving Relaxed Linear Code Equivalence Problems
6 March 2024 by
Alessandro Budroni
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Bent functions construction using extended Maiorana-McFarland’s class
6 March 2024 by
Juan Carlos Ku-Cauich
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Recent Progress in Quantum Computing Relevant to Internet Security
6 March 2024 by
Hilarie Orman
Cryptography and Security
,
Attacks and Cryptanalysis
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem
6 March 2024 by
Lars Ran
and
others
at
Eindhoven University of Technology
Cryptography and Security
,
Attacks and Cryptanalysis
Breaking the DECT Standard Cipher with Lower Time Cost
4 March 2024 by
Lin Ding
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK
4 March 2024 by
Oana Ciobotaru
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Generalized Implicit Factorization Problem
3 March 2024 by
Yansong Feng
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Revisiting the May--Meurer--Thomae Algorithm --- Solving McEliece-1409 in One Day
3 March 2024 by
Shintaro Narisada
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Diversity Algorithms for Laser Fault Injection
1 March 2024 by
Marina Krček
and
Thomas Ordas
Cryptography and Security
,
Attacks and Cryptanalysis
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
29 February 2024 by
Hosein Hadipour
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
29 February 2024 by
Jiahui He
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
28 February 2024 by
Hosein Hadipour
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
28 February 2024 by
Hosein Hadipour
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Preimage Attacks on Reduced-Round Ascon-Xof
28 February 2024 by
Seungjun Baek
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants
27 February 2024 by
Anand Kumar Narayanan
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Key Recovery Attack on the Partial Vandermonde Knapsack Problem
27 February 2024 by
Dipayan Das
and
Antoine Joux
Cryptography and Security
,
Attacks and Cryptanalysis
Time-Averaged Analysis of Selfish Mining in Bitcoin
27 February 2024 by
Roozbeh Sarenche
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
A Zero-Dimensional Gröbner Basis for Poseidon
26 February 2024 by
Matthias Johann Steiner
Cryptography and Security
,
Attacks and Cryptanalysis
FuLeakage: Breaking FuLeeca by Learning Attacks
26 February 2024 by
Felicitas Hörmann
and
Wessel Van Woerden
at
Institut de Mathématiques de Bordeaux
Cryptography and Security
,
Attacks and Cryptanalysis
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
26 February 2024 by
Xiaoyang Dong
and
others
at
Nanyang Technological University
Cryptography and Security
,
Attacks and Cryptanalysis
Automating Collision Attacks on RIPEMD-160
26 February 2024 by
Yingxin Li
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
New Records in Collision Attacks on SHA-2
26 February 2024 by
Yingxin Li
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives
26 February 2024 by
Augustin Bariant
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
An Efficient Adaptive Attack Against FESTA
26 February 2024 by
Guoqing Zhou
and
Maozhi Xu
Cryptography and Security
,
Attacks and Cryptanalysis
Partial Differential Fault Analysis on Ascon
26 February 2024 by
Yang Gao
Cryptography and Security
,
Attacks and Cryptanalysis
The Hardness of LPN over Any Integer Ring and Field for PCG Applications
25 February 2024 by
Hanlin Liu
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers
25 February 2024 by
Narendra Kumar Patel
and
Hemraj Shobharam Lamkuche
Cryptography and Security
,
Attacks and Cryptanalysis
Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme
25 February 2024 by
Valerie Gilchrist
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Load more