| Unclonability and Quantum Cryptanalysis: From Foundations to Applications | Oct 31, 2022 | CryptanalysisQuantum Machine Learning | —Unverified | 0 |
| A Critical Reassessment of Evolutionary Algorithms on the cryptanalysis of the simplified data encryption standard algorithm | Jul 8, 2014 | CryptanalysisEvolutionary Algorithms | —Unverified | 0 |
| Intelligent Systems for Information Security | Jan 15, 2014 | CryptanalysisScheduling | —Unverified | 0 |
| Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging | May 31, 2019 | Cryptanalysis | —Unverified | 0 |
| Navigating the Deep: Signature Extraction on Deep Neural Networks | Jun 20, 2025 | CryptanalysisModel extraction | —Unverified | 0 |
| Neural-Inspired Advances in Integral Cryptanalysis | May 16, 2025 | Computational EfficiencyCryptanalysis | —Unverified | 0 |
| On Cryptographic Attacks Using Backdoors for SAT | Mar 13, 2018 | Cryptanalysis | —Unverified | 0 |
| On estimating total time to solve SAT in distributed computing environments: Application to the SAT@home project | Aug 4, 2013 | CryptanalysisDistributed Computing | —Unverified | 0 |
| Rand-OFDM: A Secured Wireless Signal | Dec 11, 2019 | Cryptanalysis | —Unverified | 0 |
| Recovering AES Keys with a Deep Cold Boot Attack | Jun 9, 2021 | CryptanalysisScheduling | —Unverified | 0 |