| A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing | Oct 3, 2019 | Cryptanalysis | —Unverified | 0 |
| Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning | Aug 1, 2019 | Bayesian OptimizationCryptanalysis | CodeCode Available | 1 |
| Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging | May 31, 2019 | Cryptanalysis | —Unverified | 0 |
| Machine Learning Cryptanalysis of a Quantum Random Number Generator | May 7, 2019 | BenchmarkingBIG-bench Machine Learning | CodeCode Available | 0 |
| Translation of Algorithmic Descriptions of Discrete Functions to SAT with Applications to Cryptanalysis Problems | May 17, 2018 | CryptanalysisTranslation | —Unverified | 0 |
| On Cryptographic Attacks Using Backdoors for SAT | Mar 13, 2018 | Cryptanalysis | —Unverified | 0 |
| Learning the Enigma with Recurrent Neural Networks | Aug 24, 2017 | Cryptanalysisspeech-recognition | CodeCode Available | 0 |
| Encoding Cryptographic Functions to SAT Using Transalg System | Jul 4, 2016 | CryptanalysisDistributed Computing | CodeCode Available | 0 |
| Contravening Esotery: Cryptanalysis of Knapsack Cipher using Genetic Algorithms | Jun 20, 2016 | Cryptanalysis | —Unverified | 0 |
| A Critical Reassessment of Evolutionary Algorithms on the cryptanalysis of the simplified data encryption standard algorithm | Jul 8, 2014 | CryptanalysisEvolutionary Algorithms | —Unverified | 0 |
| Intelligent Systems for Information Security | Jan 15, 2014 | CryptanalysisScheduling | —Unverified | 0 |
| On estimating total time to solve SAT in distributed computing environments: Application to the SAT@home project | Aug 4, 2013 | CryptanalysisDistributed Computing | —Unverified | 0 |