Active
Recent
Comments
Search
Login
Login
eprint.iacr.org: 96 stories from 45 submitters
4
Constant-Time Code: The Pessimist Case
cryptography
programming
eprint.iacr.org
via
tavianator
19 hours ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
MIFARE Classic: exposing the static encrypted nonce variant
pdf
hardware
security
eprint.iacr.org
via
danderson
6 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Safe curves for elliptic curve cryptography
pdf
cryptography
eprint.iacr.org
via
fanf
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Quantum Algorithms for Lattice Problems
cryptography
eprint.iacr.org
via
sanxiyn
11 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Share with Care: Breaking E2EE in Nextcloud
security
eprint.iacr.org
via
Volt4ire
11 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
X-Wing: A post-quantum encryption scheme that wont fail if the Kyber is broken
cryptography
eprint.iacr.org
authored by
squiddish
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Passive SSH Key Compromise via Lattices
pdf
cryptography
eprint.iacr.org
via
freddyb
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
6
DuckyZip: Provably Honest Global Linking Service
cryptography
eprint.iacr.org
authored by
nadim
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
10 comments
10
6
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED
cryptography
hardware
security
eprint.iacr.org
via
quad
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
-1
WESP: An encryption method that is proven to require an exponentially growing time to break it
☶
cryptography
eprint.iacr.org
via
eBPF
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
1
SALSA PICANTE: a machine learning attack on LWE with binary secrets
☶
pdf
ai
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
0
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm
☶
pdf
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Caveat Implementor! Key Recovery Attacks on MEGA
☶
pdf
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
A Novel Related Nonce Attack for ECDSA
☶
pdf
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP
☶
pdf
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
New Records in Collision Attacks on RIPEMD-160 and SHA-256
☶
pdf
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
12
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms
cryptography
eprint.iacr.org
via
atoponce
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator
☶
pdf
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Unlimited Results: Breaking Firmware Encryption of ESP32-V3
☶
pdf
hardware
reversing
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
MacORAMa: Optimal Oblivious RAM with Integrity
☶
pdf
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
A Practical Template Attack on CRYSTALS-Dilithium
☶
pdf
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks
☶
pdf
hardware
security
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
On Protecting SPHINCS+ Against Fault Attacks
☶
pdf
cryptography
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
A Closer Look at the Chaotic Ring Oscillators based TRNG Design
☶
pdf
cryptography
hardware
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Glitch-free is not Enough
☶
pdf
hardware
security
eprint.iacr.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>