| Rand-OFDM: A Secured Wireless Signal | Dec 11, 2019 | Cryptanalysis | —Unverified | 0 | 0 |
| Recovering AES Keys with a Deep Cold Boot Attack | Jun 9, 2021 | CryptanalysisScheduling | —Unverified | 0 | 0 |
| SALSA: Attacking Lattice Cryptography with Transformers | Jul 11, 2022 | Cryptanalysis | —Unverified | 0 | 0 |
| Shallow Encoder Deep Decoder (SEDD) Networks for Image Encryption and Decryption | Jan 9, 2020 | CryptanalysisDecoder | —Unverified | 0 | 0 |
| Structured Analysis and Comparison of Alphabets in Historical Handwritten Ciphers | Oct 29, 2024 | CryptanalysisOptical Character Recognition (OCR) | —Unverified | 0 | 0 |
| Teaching Transformers Modular Arithmetic at Scale | Oct 4, 2024 | Cryptanalysis | —Unverified | 0 | 0 |
| Translation of Algorithmic Descriptions of Discrete Functions to SAT with Applications to Cryptanalysis Problems | May 17, 2018 | CryptanalysisTranslation | —Unverified | 0 | 0 |
| Unclonability and Quantum Cryptanalysis: From Foundations to Applications | Oct 31, 2022 | CryptanalysisQuantum Machine Learning | —Unverified | 0 | 0 |
| A Critical Reassessment of Evolutionary Algorithms on the cryptanalysis of the simplified data encryption standard algorithm | Jul 8, 2014 | CryptanalysisEvolutionary Algorithms | —Unverified | 0 | 0 |
| Variational Quantum Cloning: Improving Practicality for Quantum Cryptanalysis | Dec 21, 2020 | Adversarial AttackCryptanalysis | —Unverified | 0 | 0 |