SOTAVerified

Cryptanalysis

Papers

Showing 137 of 37 papers

TitleStatusHype
Navigating the Deep: Signature Extraction on Deep Neural Networks0
Benchmarking Large Language Models for Cryptanalysis and Mismatched-Generalization0
Neural-Inspired Advances in Integral Cryptanalysis0
Cryptanalysis via Machine Learning Based Information Theoretic Metrics0
Cryptanalysis of Cancelable Biometrics Vault0
Structured Analysis and Comparison of Alphabets in Historical Handwritten Ciphers0
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label SettingCode0
Teaching Transformers Modular Arithmetic at Scale0
A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers0
Cryptanalysis of the SIMON Cypher Using Neo4j0
Cryptanalysis and improvement of multimodal data encryption by machine-learning-based system0
Can a Tabula Recta provide security in the XXI century?0
Learning Quantum Processes with Quantum Statistical QueriesCode0
CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation0
Memorization for Good: Encryption with Autoregressive Language ModelsCode1
Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/640
Unclonability and Quantum Cryptanalysis: From Foundations to Applications0
SALSA: Attacking Lattice Cryptography with Transformers0
Identifying Cleartext in Historical Ciphers0
Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block CiphersCode0
Recovering AES Keys with a Deep Cold Boot Attack0
A Normal Form Characterization for Efficient Boolean Skolem Function Synthesis0
Variational Quantum Cloning: Improving Practicality for Quantum Cryptanalysis0
Shallow Encoder Deep Decoder (SEDD) Networks for Image Encryption and Decryption0
Rand-OFDM: A Secured Wireless Signal0
A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing0
Improving Attacks on Round-Reduced Speck32/64 Using Deep LearningCode1
Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging0
Machine Learning Cryptanalysis of a Quantum Random Number GeneratorCode0
Translation of Algorithmic Descriptions of Discrete Functions to SAT with Applications to Cryptanalysis Problems0
On Cryptographic Attacks Using Backdoors for SAT0
Learning the Enigma with Recurrent Neural NetworksCode0
Encoding Cryptographic Functions to SAT Using Transalg SystemCode0
Contravening Esotery: Cryptanalysis of Knapsack Cipher using Genetic Algorithms0
A Critical Reassessment of Evolutionary Algorithms on the cryptanalysis of the simplified data encryption standard algorithm0
Intelligent Systems for Information Security0
On estimating total time to solve SAT in distributed computing environments: Application to the SAT@home project0
Show:102550

No leaderboard results yet.