| | Subverting Telegram’s End-to-End Encryption (iacr.org) |
| 2 points by ototot on March 26, 2023 | past | 1 comment |
|
| | A Vulnerability in Implementations of SHA-3, Shake, EdDSA, and Other NIST-Appro [pdf] (iacr.org) |
| 1 point by todsacerdoti on March 12, 2023 | past |
|
| | Analysis of Ripemd-160: New Collision Attacks and Finding Characteristics with [pdf] (iacr.org) |
| 1 point by todsacerdoti on March 12, 2023 | past |
|
| | A Vulnerability in Implementations of SHA-3, Shake, EdDSA (iacr.org) |
| 185 points by state on March 7, 2023 | past | 47 comments |
|
| | Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography (iacr.org) |
| 59 points by Laaas on March 5, 2023 | past | 7 comments |
|
| | Side-channel attack on CRYSTALS-Kyber, selected post-quantun cipher [pdf] (iacr.org) |
| 2 points by lknik on March 1, 2023 | past |
|
| | A security analysis comparison between Signal, WhatsApp and Telegram (iacr.org) |
| 3 points by jjav on Jan 23, 2023 | past |
|
| | A Practical Template Attack on Crystals-Dilithium [pdf] (iacr.org) |
| 2 points by todsacerdoti on Jan 20, 2023 | past |
|
| | A Gentle Tutorial for Lattice-Based Cryptanalysis [pdf] (iacr.org) |
| 14 points by todsacerdoti on Jan 20, 2023 | past | 1 comment |
|
| | Fermat Factorization in the Wild (iacr.org) |
| 1 point by rcarmo on Jan 10, 2023 | past |
|
| | Fermat Factorization in the Wild (iacr.org) |
| 1 point by _Microft on Jan 9, 2023 | past |
|
| | Reinforced Concrete: A Fast Hash Function for Verifiable Computation (iacr.org) |
| 1 point by simonpure on Dec 16, 2022 | past |
|
| | Breaking Halfloop-24 (iacr.org) |
| 1 point by wglb on Sept 18, 2022 | past |
|
| | Breaking SIDH in polynomial time [pdf] (iacr.org) |
| 2 points by mooreds on Aug 31, 2022 | past |
|
| | Breaking SIDH in Polynomial Time (iacr.org) |
| 3 points by g0xA52A2A on Aug 11, 2022 | past | 1 comment |
|
| | Too Much Crypto (2019) [pdf] (iacr.org) |
| 1 point by woodruffw on Aug 6, 2022 | past |
|
| | Critical perspectives on provable security (2019) [pdf] (iacr.org) |
| 1 point by Tomte on Aug 3, 2022 | past |
|
| | Post-quantum cryptography–-dealing with the fallout of physics success (iacr.org) |
| 3 points by anupj on Aug 2, 2022 | past |
|
| | An efficient key recovery attack on SIDH [pdf] (iacr.org) |
| 1 point by arkadiyt on July 30, 2022 | past |
|
| | An efficient key recovery attack on SIDH (iacr.org) |
| 52 points by robinhouston on July 30, 2022 | past | 14 comments |
|
| | (In)security of the Radio Interface in Sigfox [pdf] (iacr.org) |
| 3 points by teleforce on July 30, 2022 | past |
|
| | Cryptanalyzing MEGA in Six Queries (iacr.org) |
| 44 points by rudyruiz on July 16, 2022 | past | 11 comments |
|
| | Cryptanalyzing Mega in Six Queries [pdf] (iacr.org) |
| 3 points by edenceover on July 15, 2022 | past |
|
| | Unclonable Polymers and Their Cryptographic Applications (iacr.org) |
| 35 points by somezero on May 31, 2022 | past | 9 comments |
|
| | Provable Security Analysis of FIDO2 (iacr.org) |
| 1 point by simonpure on May 30, 2022 | past |
|
| | Anamorphic Encryption: Private Communication Against a Dictator (iacr.org) |
| 3 points by homarp on May 27, 2022 | past |
|
| | Seedless Fruit Is the Sweetest: Random Number Generation, Revisited (2019) (iacr.org) |
| 1 point by rdpintqogeogsaa on May 26, 2022 | past |
|
| | Caulk: Lookup Arguments in Sublinear Time (iacr.org) |
| 2 points by ricochet11 on May 24, 2022 | past |
|
| | Private Approximate Nearest Neighbor Search with Sublinear Communication [pdf] (iacr.org) |
| 2 points by taubek on May 20, 2022 | past |
|
| | On the Cryptographic Fragility of the Telegram Ecosystem (iacr.org) |
| 2 points by mritzmann on May 17, 2022 | past |
|
|
| More |