| Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning | Aug 1, 2019 | Bayesian OptimizationCryptanalysis | CodeCode Available | 1 | 5 |
| Memorization for Good: Encryption with Autoregressive Language Models | May 15, 2023 | CryptanalysisMemorization | CodeCode Available | 1 | 5 |
| Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers | Jan 11, 2022 | CryptanalysisDeep Learning | CodeCode Available | 0 | 5 |
| Learning Quantum Processes with Quantum Statistical Queries | Oct 3, 2023 | BenchmarkingCryptanalysis | CodeCode Available | 0 | 5 |
| Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting | Oct 8, 2024 | Cryptanalysis | CodeCode Available | 0 | 5 |
| Machine Learning Cryptanalysis of a Quantum Random Number Generator | May 7, 2019 | BenchmarkingBIG-bench Machine Learning | CodeCode Available | 0 | 5 |
| Learning the Enigma with Recurrent Neural Networks | Aug 24, 2017 | Cryptanalysisspeech-recognition | CodeCode Available | 0 | 5 |
| Encoding Cryptographic Functions to SAT Using Transalg System | Jul 4, 2016 | CryptanalysisDistributed Computing | CodeCode Available | 0 | 5 |
| Cryptanalysis of Cancelable Biometrics Vault | Jan 10, 2025 | Cryptanalysis | —Unverified | 0 | 0 |
| Cryptanalysis of the SIMON Cypher Using Neo4j | May 8, 2024 | CryptanalysisKnowledge Graphs | —Unverified | 0 | 0 |
| Cryptanalysis via Machine Learning Based Information Theoretic Metrics | Jan 25, 2025 | Cryptanalysis | —Unverified | 0 | 0 |
| CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation | Sep 14, 2023 | Cryptanalysis | —Unverified | 0 | 0 |
| Identifying Cleartext in Historical Ciphers | Jun 1, 2022 | Cryptanalysis | —Unverified | 0 | 0 |
| Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64 | Jan 27, 2023 | Cryptanalysis | —Unverified | 0 | 0 |
| Intelligent Systems for Information Security | Jan 15, 2014 | CryptanalysisScheduling | —Unverified | 0 | 0 |
| Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging | May 31, 2019 | Cryptanalysis | —Unverified | 0 | 0 |
| Navigating the Deep: Signature Extraction on Deep Neural Networks | Jun 20, 2025 | CryptanalysisModel extraction | —Unverified | 0 | 0 |
| Neural-Inspired Advances in Integral Cryptanalysis | May 16, 2025 | Computational EfficiencyCryptanalysis | —Unverified | 0 | 0 |
| On Cryptographic Attacks Using Backdoors for SAT | Mar 13, 2018 | Cryptanalysis | —Unverified | 0 | 0 |
| On estimating total time to solve SAT in distributed computing environments: Application to the SAT@home project | Aug 4, 2013 | CryptanalysisDistributed Computing | —Unverified | 0 | 0 |
| Rand-OFDM: A Secured Wireless Signal | Dec 11, 2019 | Cryptanalysis | —Unverified | 0 | 0 |
| Recovering AES Keys with a Deep Cold Boot Attack | Jun 9, 2021 | CryptanalysisScheduling | —Unverified | 0 | 0 |
| SALSA: Attacking Lattice Cryptography with Transformers | Jul 11, 2022 | Cryptanalysis | —Unverified | 0 | 0 |
| Shallow Encoder Deep Decoder (SEDD) Networks for Image Encryption and Decryption | Jan 9, 2020 | CryptanalysisDecoder | —Unverified | 0 | 0 |
| Structured Analysis and Comparison of Alphabets in Historical Handwritten Ciphers | Oct 29, 2024 | CryptanalysisOptical Character Recognition (OCR) | —Unverified | 0 | 0 |
| Teaching Transformers Modular Arithmetic at Scale | Oct 4, 2024 | Cryptanalysis | —Unverified | 0 | 0 |
| Translation of Algorithmic Descriptions of Discrete Functions to SAT with Applications to Cryptanalysis Problems | May 17, 2018 | CryptanalysisTranslation | —Unverified | 0 | 0 |
| Unclonability and Quantum Cryptanalysis: From Foundations to Applications | Oct 31, 2022 | CryptanalysisQuantum Machine Learning | —Unverified | 0 | 0 |
| A Critical Reassessment of Evolutionary Algorithms on the cryptanalysis of the simplified data encryption standard algorithm | Jul 8, 2014 | CryptanalysisEvolutionary Algorithms | —Unverified | 0 | 0 |
| Variational Quantum Cloning: Improving Practicality for Quantum Cryptanalysis | Dec 21, 2020 | Adversarial AttackCryptanalysis | —Unverified | 0 | 0 |
| A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing | Oct 3, 2019 | Cryptanalysis | —Unverified | 0 | 0 |
| A Normal Form Characterization for Efficient Boolean Skolem Function Synthesis | Apr 29, 2021 | CryptanalysisForm | —Unverified | 0 | 0 |
| Benchmarking Large Language Models for Cryptanalysis and Mismatched-Generalization | May 30, 2025 | BenchmarkingCryptanalysis | —Unverified | 0 | 0 |
| A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers | May 30, 2024 | CryptanalysisMemorization | —Unverified | 0 | 0 |
| Can a Tabula Recta provide security in the XXI century? | Dec 5, 2023 | Cryptanalysis | —Unverified | 0 | 0 |
| Contravening Esotery: Cryptanalysis of Knapsack Cipher using Genetic Algorithms | Jun 20, 2016 | Cryptanalysis | —Unverified | 0 | 0 |
| Cryptanalysis and improvement of multimodal data encryption by machine-learning-based system | Feb 24, 2024 | Cryptanalysis | —Unverified | 0 | 0 |