Active
Recent
Comments
Search
Login
Login
eprint.iacr.org: 86 stories from 38 submitters
1
SALSA PICANTE: a machine learning attack on LWE with binary secrets
☶
pdf
ai
cryptography
eprint.iacr.org
via
calvin
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
0
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm
☶
pdf
cryptography
eprint.iacr.org
via
calvin
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Caveat Implementor! Key Recovery Attacks on MEGA
☶
pdf
cryptography
eprint.iacr.org
via
calvin
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
A Novel Related Nonce Attack for ECDSA
☶
pdf
cryptography
eprint.iacr.org
via
calvin
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP
☶
pdf
cryptography
eprint.iacr.org
via
calvin
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
New Records in Collision Attacks on RIPEMD-160 and SHA-256
☶
pdf
cryptography
eprint.iacr.org
via
calvin
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
12
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms
cryptography
eprint.iacr.org
via
atoponce
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator
☶
pdf
cryptography
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Unlimited Results: Breaking Firmware Encryption of ESP32-V3
☶
pdf
hardware
reversing
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
MacORAMa: Optimal Oblivious RAM with Integrity
☶
pdf
cryptography
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
A Practical Template Attack on CRYSTALS-Dilithium
☶
pdf
cryptography
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks
☶
pdf
hardware
security
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
On Protecting SPHINCS+ Against Fault Attacks
☶
pdf
cryptography
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
A Closer Look at the Chaotic Ring Oscillators based TRNG Design
☶
pdf
cryptography
hardware
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Glitch-free is not Enough
☶
pdf
hardware
security
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries
☶
pdf
security
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
A Gentle Tutorial for Lattice-Based Cryptanalysis
☶
pdf
cryptography
eprint.iacr.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
nQUIC: Noise-Based QUIC Packet Protection (2019)
pdf
networking
security
eprint.iacr.org
via
kuijsten
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
-1
On Cryptocurrency Wallet Design
☶
pdf
security
eprint.iacr.org
via
snej
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
An efficient key recovery attack on SIDH (preliminary version)
cryptography
eprint.iacr.org
via
river
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Cryptanalyzing MEGA in Six Queries
cryptography
eprint.iacr.org
via
atoponce
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Trust Dies in Darkness: Shedding Light on Samsung’s TrustZone Keymaster Design
pdf
security
eprint.iacr.org
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
CCA secure ElGamal encryption over an integer group where ICDH assumption holds
pdf
cryptography
eprint.iacr.org
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
4
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
☶
pdf
hardware
ios
reversing
security
eprint.iacr.org
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
How to Backdoor a Cipher
cryptography
eprint.iacr.org
via
crazyloglad
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
Page 2 >>