| Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning | Aug 1, 2019 | Bayesian OptimizationCryptanalysis | CodeCode Available | 1 | 5 |
| Memorization for Good: Encryption with Autoregressive Language Models | May 15, 2023 | CryptanalysisMemorization | CodeCode Available | 1 | 5 |
| Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers | Jan 11, 2022 | CryptanalysisDeep Learning | CodeCode Available | 0 | 5 |
| Learning Quantum Processes with Quantum Statistical Queries | Oct 3, 2023 | BenchmarkingCryptanalysis | CodeCode Available | 0 | 5 |
| Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting | Oct 8, 2024 | Cryptanalysis | CodeCode Available | 0 | 5 |
| Machine Learning Cryptanalysis of a Quantum Random Number Generator | May 7, 2019 | BenchmarkingBIG-bench Machine Learning | CodeCode Available | 0 | 5 |
| Learning the Enigma with Recurrent Neural Networks | Aug 24, 2017 | Cryptanalysisspeech-recognition | CodeCode Available | 0 | 5 |
| Encoding Cryptographic Functions to SAT Using Transalg System | Jul 4, 2016 | CryptanalysisDistributed Computing | CodeCode Available | 0 | 5 |
| Cryptanalysis of Cancelable Biometrics Vault | Jan 10, 2025 | Cryptanalysis | —Unverified | 0 | 0 |
| Cryptanalysis of the SIMON Cypher Using Neo4j | May 8, 2024 | CryptanalysisKnowledge Graphs | —Unverified | 0 | 0 |
| Cryptanalysis via Machine Learning Based Information Theoretic Metrics | Jan 25, 2025 | Cryptanalysis | —Unverified | 0 | 0 |
| CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation | Sep 14, 2023 | Cryptanalysis | —Unverified | 0 | 0 |
| Identifying Cleartext in Historical Ciphers | Jun 1, 2022 | Cryptanalysis | —Unverified | 0 | 0 |
| Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64 | Jan 27, 2023 | Cryptanalysis | —Unverified | 0 | 0 |
| Intelligent Systems for Information Security | Jan 15, 2014 | CryptanalysisScheduling | —Unverified | 0 | 0 |
| Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging | May 31, 2019 | Cryptanalysis | —Unverified | 0 | 0 |
| Navigating the Deep: Signature Extraction on Deep Neural Networks | Jun 20, 2025 | CryptanalysisModel extraction | —Unverified | 0 | 0 |
| Neural-Inspired Advances in Integral Cryptanalysis | May 16, 2025 | Computational EfficiencyCryptanalysis | —Unverified | 0 | 0 |
| On Cryptographic Attacks Using Backdoors for SAT | Mar 13, 2018 | Cryptanalysis | —Unverified | 0 | 0 |
| On estimating total time to solve SAT in distributed computing environments: Application to the SAT@home project | Aug 4, 2013 | CryptanalysisDistributed Computing | —Unverified | 0 | 0 |
| Rand-OFDM: A Secured Wireless Signal | Dec 11, 2019 | Cryptanalysis | —Unverified | 0 | 0 |
| Recovering AES Keys with a Deep Cold Boot Attack | Jun 9, 2021 | CryptanalysisScheduling | —Unverified | 0 | 0 |
| SALSA: Attacking Lattice Cryptography with Transformers | Jul 11, 2022 | Cryptanalysis | —Unverified | 0 | 0 |
| Shallow Encoder Deep Decoder (SEDD) Networks for Image Encryption and Decryption | Jan 9, 2020 | CryptanalysisDecoder | —Unverified | 0 | 0 |
| Structured Analysis and Comparison of Alphabets in Historical Handwritten Ciphers | Oct 29, 2024 | CryptanalysisOptical Character Recognition (OCR) | —Unverified | 0 | 0 |