Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. | 0 | 0.34 | 2022 |
A Detailed Analysis Of Primal Attack And Its Variants | 0 | 0.34 | 2022 |
Improved MITM Cryptanalysis on Streebog | 0 | 0.34 | 2022 |
Meet-In-The-Middle Attacks Revisited: Key-Recovery, Collision, And Preimage Attacks | 0 | 0.34 | 2021 |
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. | 0 | 0.34 | 2021 |
A Dedicated Hardware Accelerator For Real-Time Acceleration Of Yolov2 | 1 | 0.37 | 2021 |
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems | 0 | 0.34 | 2021 |
Retraction: The Correlation Between Social Transformation Economic Risk And Internet Public Opinion (Retraction Of Vol 40, Pg 723, 2020) | 0 | 0.34 | 2021 |
Chosen Base-Point Side-Channel Attack On Montgomery Ladder Withx-Only Coordinate: With Application To Secp256k1 | 0 | 0.34 | 2020 |
New Conditional Cube Attack On Keccak Keyed Modes | 0 | 0.34 | 2019 |
New Distinguisher On Reduced-Round Keccak Sponge Function | 0 | 0.34 | 2019 |
A regulated digital currency | 4 | 0.43 | 2019 |
A Scalable OpenCL-Based FPGA Accelerator for YOLOv2 | 0 | 0.34 | 2019 |
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications. | 0 | 0.34 | 2019 |
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash. | 0 | 0.34 | 2019 |
Improved automatic search of impossible differentials for camellia with / layers. | 1 | 0.35 | 2018 |
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256. | 0 | 0.34 | 2018 |
Error Estimation of Practical Convolution Discrete Gaussian Sampling. | 0 | 0.34 | 2018 |
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques. | 0 | 0.34 | 2018 |
Conditional Cube Attack on Round-Reduced River Keyak. | 1 | 0.35 | 2018 |
Quantum attacks on some feistel block ciphers | 2 | 0.40 | 2018 |
Impossible Differential Attack on Simpira v2. | 0 | 0.34 | 2018 |
A Key-recovery Attack on 855-round Trivium. | 2 | 0.37 | 2018 |
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. | 1 | 0.35 | 2018 |
Improved automatic search of impossible differentials for camellia with FL/FL -1 layers. | 1 | 0.35 | 2018 |
Improved integral attacks without full codebook. | 0 | 0.34 | 2018 |
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes. | 0 | 0.34 | 2018 |
Quantum Key-recovery Attack on Feistel Structures. | 0 | 0.34 | 2018 |
Analysis of Software Implemented Low Entropy Masking Schemes. | 0 | 0.34 | 2018 |
The Application of Dynamic Models to the Exploration of β1-AR Overactivation as a Cause of Heart Failure. | 0 | 0.34 | 2018 |
Impossible Differential Attack on Midori128 Using Rebound-like Technique. | 0 | 0.34 | 2017 |
A Key Backup Scheme Based on Bitcoin. | 0 | 0.34 | 2017 |
Quantum Cryptanalysis on Some Generalized Feistel Schemes. | 3 | 0.41 | 2017 |
Conditional Cube Attack On Round-Reduced Ascon | 4 | 0.55 | 2017 |
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently. | 0 | 0.34 | 2017 |
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. | 7 | 0.48 | 2017 |
Provably Secure NTRUEncrypt over More General Cyclotomic Rings. | 0 | 0.34 | 2017 |
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. | 4 | 0.41 | 2017 |
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques. | 12 | 0.61 | 2016 |
Cryptanalysis of a Homomorphic Encryption Scheme Over Integers. | 0 | 0.34 | 2016 |
Enhancing Cognitive Control for Improvement of Inspection Performance: A Study of Construction Safety. | 0 | 0.34 | 2016 |
Improved Attacks on Reduced-Round Camellia-128/192/256. | 5 | 0.41 | 2015 |
A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP Challenge | 3 | 0.41 | 2015 |
Impossible Differential Cryptanalysis of Reduced Round SIMON. | 8 | 0.58 | 2015 |
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia | 6 | 0.47 | 2015 |
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256 | 4 | 0.48 | 2015 |
Finding Shortest Lattice Vectors in the Presence of Gaps. | 1 | 0.35 | 2015 |
Improved Impossible Differential Attack on Reduced-Round LBlock. | 1 | 0.35 | 2015 |
Improved Differential Attacks on Reduced SIMON Versions. | 8 | 0.60 | 2014 |
A note on BDD problems with λ2 -gap | 0 | 0.34 | 2014 |