| | Breaking Halfloop-24 (iacr.org) |
| 1 point by wglb on Sept 18, 2022 | past |
|
| | Breaking SIDH in polynomial time [pdf] (iacr.org) |
| 2 points by mooreds on Aug 31, 2022 | past |
|
| | Breaking SIDH in Polynomial Time (iacr.org) |
| 3 points by g0xA52A2A on Aug 11, 2022 | past | 1 comment |
|
| | Too Much Crypto (2019) [pdf] (iacr.org) |
| 1 point by woodruffw on Aug 6, 2022 | past |
|
| | Critical perspectives on provable security (2019) [pdf] (iacr.org) |
| 1 point by Tomte on Aug 3, 2022 | past |
|
| | Post-quantum cryptography–-dealing with the fallout of physics success (iacr.org) |
| 3 points by anupj on Aug 2, 2022 | past |
|
| | An efficient key recovery attack on SIDH [pdf] (iacr.org) |
| 1 point by arkadiyt on July 30, 2022 | past |
|
| | An efficient key recovery attack on SIDH (iacr.org) |
| 52 points by robinhouston on July 30, 2022 | past | 14 comments |
|
| | (In)security of the Radio Interface in Sigfox [pdf] (iacr.org) |
| 3 points by teleforce on July 30, 2022 | past |
|
| | Cryptanalyzing MEGA in Six Queries (iacr.org) |
| 44 points by rudyruiz on July 16, 2022 | past | 11 comments |
|
| | Cryptanalyzing Mega in Six Queries [pdf] (iacr.org) |
| 3 points by edenceover on July 15, 2022 | past |
|
| | Unclonable Polymers and Their Cryptographic Applications (iacr.org) |
| 35 points by somezero on May 31, 2022 | past | 9 comments |
|
| | Provable Security Analysis of FIDO2 (iacr.org) |
| 1 point by simonpure on May 30, 2022 | past |
|
| | Anamorphic Encryption: Private Communication Against a Dictator (iacr.org) |
| 3 points by homarp on May 27, 2022 | past |
|
| | Seedless Fruit Is the Sweetest: Random Number Generation, Revisited (2019) (iacr.org) |
| 1 point by rdpintqogeogsaa on May 26, 2022 | past |
|
| | Caulk: Lookup Arguments in Sublinear Time (iacr.org) |
| 2 points by ricochet11 on May 24, 2022 | past |
|
| | Private Approximate Nearest Neighbor Search with Sublinear Communication [pdf] (iacr.org) |
| 2 points by taubek on May 20, 2022 | past |
|
| | On the Cryptographic Fragility of the Telegram Ecosystem (iacr.org) |
| 2 points by mritzmann on May 17, 2022 | past |
|
| | On the (in)security of ElGamal in OpenPGP [pdf] (iacr.org) |
| 3 points by rdpintqogeogsaa on May 6, 2022 | past |
|
| | What Cryptographic Library Developers Think About Timing Attacks (2021) [pdf] (iacr.org) |
| 2 points by mooreds on May 5, 2022 | past |
|
| | Zero-Knowledge Middleboxes: enforce network policies on encrypted traffic (iacr.org) |
| 82 points by self on April 17, 2022 | past | 20 comments |
|
| | To Shift or Not to Shift: Understanding GEA-1 [pdf] (iacr.org) |
| 1 point by pabs3 on March 25, 2022 | past |
|
| | Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 [pdf] (iacr.org) |
| 3 points by pabs3 on March 25, 2022 | past |
|
| | Breaking Rainbow Takes a Weekend on a Laptop [pdf] (iacr.org) |
| 3 points by simonebrunozzi on March 23, 2022 | past |
|
| | Base64 Malleability in Practice (iacr.org) |
| 2 points by rdpintqogeogsaa on March 18, 2022 | past |
|
| | How Practical Are Fault Injection Attacks, Really? (iacr.org) |
| 2 points by rdpintqogeogsaa on March 8, 2022 | past |
|
| | Two Attacks on Proof-of-Stake Ghost/Ethereum (iacr.org) |
| 2 points by photon12 on March 8, 2022 | past |
|
| | Trust dies in darkness: Shedding light on Samsung’s TrustZone Keymaster design [pdf] (iacr.org) |
| 165 points by zdw on March 4, 2022 | past | 27 comments |
|
| | Samsung Encryption Vulnerability [pdf] (iacr.org) |
| 1 point by News-Dog on March 1, 2022 | past |
|
| | Breaking Rainbow Takes a Weekend on a Laptop [pdf] (iacr.org) |
| 2 points by DyslexicAtheist on Feb 25, 2022 | past |
|
|
| More |