| | On the Distribution of the Distances of Random Words (iacr.org) |
| 2 points by quantumgarbage 4 days ago | past | 1 comment |
|
| | Security Mesh Monitoring Using Low-Cost, Embedded Time Domain Reflectometry (iacr.org) |
| 2 points by ahlCVA 13 days ago | past | discuss |
|
| | Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical (iacr.org) |
| 1 point by nabla9 16 days ago | past |
|
| | High-Throughput Universally Composable Threshold FHE Decryption (iacr.org) |
| 2 points by badcryptobitch 19 days ago | past |
|
| | Practical seed recovery for the PCG pseudo-random number generator (iacr.org) |
| 3 points by fanf2 21 days ago | past | 1 comment |
|
| | Lookup Table Arguments Systematization of Knowledge (iacr.org) |
| 3 points by altro 22 days ago | past |
|
| | Subverting Telegram's end-to-end encryption (2023) (iacr.org) |
| 105 points by pona-a 23 days ago | past | 92 comments |
|
| | How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf] (iacr.org) |
| 4 points by todsacerdoti 58 days ago | past |
|
| | Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption (iacr.org) |
| 4 points by gananthraman 69 days ago | past |
|
| | Tlock: Practical timelock encryption from threshold BLS (2023) [pdf] (iacr.org) |
| 2 points by wslh 74 days ago | past |
|
| | Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs (iacr.org) |
| 1 point by petethomas 77 days ago | past |
|
| | How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org) |
| 2 points by belter 3 months ago | past |
|
| | Replication of Quantum Factorisation Records with a VIC-20, an Abacus, and a Dog (iacr.org) |
| 84 points by teddyh 3 months ago | past | 25 comments |
|
| | Replication of Quantum Factorisation Records; a Home Computer, Abacus, and a Dog (iacr.org) |
| 1 point by ChuckMcM 3 months ago | past | 2 comments |
|
| | Formal Security & Verification of Cryptographic Protocol Implementations in Rust (iacr.org) |
| 2 points by matt_d 3 months ago | past |
|
| | Replication of Quantum Factorisation with an 8-Bit Computer, an Abacus and a Dog (iacr.org) |
| 3 points by indy 3 months ago | past |
|
| | Replication of Quantum Factorisation Records with an 8-bit Home Computer [pdf] (iacr.org) |
| 137 points by sebgan 3 months ago | past | 32 comments |
|
| | How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org) |
| 6 points by Bluestein 3 months ago | past |
|
| | Quantum Computing without the Linear Algebra [pdf] (iacr.org) |
| 2 points by adamnemecek 4 months ago | past |
|
| | Quantum Computing without the Linear Algebra [pdf] (iacr.org) |
| 1 point by abhi9u 4 months ago | past |
|
| | Quantum Computing without the Linear Algebra [pdf] (iacr.org) |
| 2 points by marvel_boy 4 months ago | past |
|
| | AWS introduces key committing variant of XAES-256-GCM [pdf] (iacr.org) |
| 1 point by HillRat 6 months ago | past |
|
| | OAuth Audience Injection Attacks [pdf] (iacr.org) |
| 1 point by mooreds 6 months ago | past |
|
| | Traceable Verifiable Random Functions (iacr.org) |
| 2 points by wslh 6 months ago | past |
|
| | Collisions for MD4, MD5, HAVAL-128 and RIPEMD (2004) [pdf] (iacr.org) |
| 2 points by kretaceous 6 months ago | past |
|
| | Constant-time code: the pessimist's case (iacr.org) |
| 1 point by fanf2 7 months ago | past |
|
| | Keying Merkle-Damgård at the Suffix (iacr.org) |
| 1 point by dchest 7 months ago | past |
|
| | GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and Tetra [pdf] (iacr.org) |
| 2 points by gnabgib 7 months ago | past |
|
| | Constant-Time Code: The Pessimist Case [pdf] (iacr.org) |
| 92 points by yuedongze 8 months ago | past | 66 comments |
|
| | Constant-time coding is, or will soon become, infeasible in all generality [pdf] (iacr.org) |
| 1 point by jedisct1 8 months ago | past |
|
|
| More |