| Memorization for Good: Encryption with Autoregressive Language Models | May 15, 2023 | CryptanalysisMemorization | CodeCode Available | 1 | 5 |
| Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning | Aug 1, 2019 | Bayesian OptimizationCryptanalysis | CodeCode Available | 1 | 5 |
| Learning Quantum Processes with Quantum Statistical Queries | Oct 3, 2023 | BenchmarkingCryptanalysis | CodeCode Available | 0 | 5 |
| Learning the Enigma with Recurrent Neural Networks | Aug 24, 2017 | Cryptanalysisspeech-recognition | CodeCode Available | 0 | 5 |
| Encoding Cryptographic Functions to SAT Using Transalg System | Jul 4, 2016 | CryptanalysisDistributed Computing | CodeCode Available | 0 | 5 |
| Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting | Oct 8, 2024 | Cryptanalysis | CodeCode Available | 0 | 5 |
| Machine Learning Cryptanalysis of a Quantum Random Number Generator | May 7, 2019 | BenchmarkingBIG-bench Machine Learning | CodeCode Available | 0 | 5 |
| Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers | Jan 11, 2022 | CryptanalysisDeep Learning | CodeCode Available | 0 | 5 |
| Contravening Esotery: Cryptanalysis of Knapsack Cipher using Genetic Algorithms | Jun 20, 2016 | Cryptanalysis | —Unverified | 0 | 0 |
| Can a Tabula Recta provide security in the XXI century? | Dec 5, 2023 | Cryptanalysis | —Unverified | 0 | 0 |