| | Subverting Telegram's end-to-end encryption (2023) (iacr.org) |
| 105 points by pona-a 5 months ago | past | 92 comments |
|
| | How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf] (iacr.org) |
| 4 points by todsacerdoti 6 months ago | past |
|
| | Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption (iacr.org) |
| 4 points by gananthraman 6 months ago | past |
|
| | Tlock: Practical timelock encryption from threshold BLS (2023) [pdf] (iacr.org) |
| 2 points by wslh 6 months ago | past |
|
| | Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs (iacr.org) |
| 1 point by petethomas 6 months ago | past |
|
| | How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org) |
| 2 points by belter 7 months ago | past |
|
| | Replication of Quantum Factorisation Records with a VIC-20, an Abacus, and a Dog (iacr.org) |
| 84 points by teddyh 8 months ago | past | 25 comments |
|
| | Replication of Quantum Factorisation Records; a Home Computer, Abacus, and a Dog (iacr.org) |
| 1 point by ChuckMcM 8 months ago | past | 2 comments |
|
| | Formal Security & Verification of Cryptographic Protocol Implementations in Rust (iacr.org) |
| 2 points by matt_d 8 months ago | past |
|
| | Replication of Quantum Factorisation with an 8-Bit Computer, an Abacus and a Dog (iacr.org) |
| 3 points by indy 8 months ago | past |
|
| | Replication of Quantum Factorisation Records with an 8-bit Home Computer [pdf] (iacr.org) |
| 137 points by sebgan 8 months ago | past | 32 comments |
|
| | How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org) |
| 6 points by Bluestein 8 months ago | past |
|
| | Quantum Computing without the Linear Algebra [pdf] (iacr.org) |
| 2 points by adamnemecek 9 months ago | past |
|
| | Quantum Computing without the Linear Algebra [pdf] (iacr.org) |
| 1 point by abhi9u 9 months ago | past |
|
| | Quantum Computing without the Linear Algebra [pdf] (iacr.org) |
| 2 points by marvel_boy 9 months ago | past |
|
| | AWS introduces key committing variant of XAES-256-GCM [pdf] (iacr.org) |
| 1 point by HillRat 10 months ago | past |
|
| | OAuth Audience Injection Attacks [pdf] (iacr.org) |
| 1 point by mooreds 10 months ago | past |
|
| | Traceable Verifiable Random Functions (iacr.org) |
| 2 points by wslh 10 months ago | past |
|
| | Collisions for MD4, MD5, HAVAL-128 and RIPEMD (2004) [pdf] (iacr.org) |
| 2 points by kretaceous 11 months ago | past |
|
| | Constant-time code: the pessimist's case (iacr.org) |
| 1 point by fanf2 11 months ago | past |
|
| | Keying Merkle-Damgård at the Suffix (iacr.org) |
| 1 point by dchest 12 months ago | past |
|
| | GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and Tetra [pdf] (iacr.org) |
| 2 points by gnabgib 12 months ago | past |
|
| | Constant-Time Code: The Pessimist Case [pdf] (iacr.org) |
| 92 points by yuedongze on March 9, 2025 | past | 66 comments |
|
| | Constant-time coding is, or will soon become, infeasible in all generality [pdf] (iacr.org) |
| 1 point by jedisct1 on March 8, 2025 | past |
|
| | How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org) |
| 2 points by pbrowne011 on Jan 27, 2025 | past |
|
| | ColliderScript: Covenants in Bitcoin via 160-bit hash collisions (iacr.org) |
| 2 points by noch on Jan 23, 2025 | past |
|
| | Approaches to Solving SVP in Lattice Cryptography with Quantum Gravity (iacr.org) |
| 1 point by noam_k on Jan 13, 2025 | past |
|
| | CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust (iacr.org) |
| 1 point by EvgeniyZh on Jan 13, 2025 | past |
|
| | Knot-based Key Exchange protocol (iacr.org) |
| 1 point by RadixDLT on Dec 17, 2024 | past |
|
| | Chosen-Prefix Collisions on AES-Like Hashing (iacr.org) |
| 2 points by pentestercrab on Nov 25, 2024 | past |
|
|
| More |