Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Pulsar: Secure Steganography for Diffusion Models

Provable Security of Linux-DRBG in the Seedless Robustness Model [pdf]

Safe curves for Elliptic Curve Cryptography [pdf]

MIFARE Classic: exposing the static encrypted nonce variant [pdf]

Shufflecake: Plausible deniability for hidden filesystems on Linux (2023)

Asynchronous Consensus Without Trusted Setup or Public-Key Cryptography

Breaking Signal Messenger's Post-Compromise Security Through a Malicious Device [pdf]

Share with Care: Breaking E2EE in Nextcloud

Quantum Algorithms for Lattice Problems

X-Wing: A post-quantum encryption scheme that wont fail if the Kyber is broken

Passive SSH Key Compromise via Lattices [pdf]

Falcon Down: Breaking Falcon Signature Scheme Through Side-Channel Attacks [pdf] (2021)

Fast and Clean: Auditable high-performance assembly via constraint solving [pdf]

ASMesh: Anonymous, Secure Messaging in Mesh Networks

DuckyZip: Provably Honest Global Linking Service

Fast modular squaring with AVX512IFMA (2018) [pdf]

Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED

WESP: An encryption method that is proven to require an exponentially growing time to break it

Undetectable Watermarks for Language Models

Research Philosophy of Modern Cryptography

A Vulnerability in Implementations of SHA-3, Shake, EdDSA

New Records in Collision Attacks on RIPEMD-160 and SHA-256

Caveat Implementor! Key Recovery Attacks on MEGA

Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP

A Novel Related Nonce Attack for ECDSA

SALSA PICANTE: a machine learning attack on LWE with binary secrets

Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography

A Gentle Tutorial for Lattice-Based Cryptanalysis

On Protecting SPHINCS+ Against Fault Attacks

A Closer Look at the Chaotic Ring Oscillators based TRNG Design

More →