all InfoSec news
Topic: cryptanalysis
Gr\"obner Basis Cryptanalysis of Ciminion and Hydra
1 week, 2 days ago |
arxiv.org
Cryptanalysis of the SIMON Cypher Using Neo4j
1 week, 2 days ago |
arxiv.org
Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem
2 weeks, 5 days ago |
arxiv.org
New Lattice Cryptanalytic Technique
1 month ago |
www.schneier.com
Security Assessment of the LG Cryptosystem
1 month, 1 week ago |
arxiv.org
In Memoriam: Ross Anderson, 1956-2024
1 month, 1 week ago |
www.schneier.com
Optimal s-boxes against alternative operations
1 month, 2 weeks ago |
arxiv.org
Guess and Determine Analysis Based on Set Split
1 month, 3 weeks ago |
www.iacr.org
Mathematics for Post-Quantum Cryptanalysis
2 months, 1 week ago |
www.iacr.org
The legacy of Bletchley Park on UK mathematics
2 months, 1 week ago |
arxiv.org
Improved Differential Meet-In-The-Middle Cryptanalysis
2 months, 2 weeks ago |
www.iacr.org
Apple Announces Post-Quantum Encryption Algorithms for iMessage
2 months, 3 weeks ago |
www.schneier.com
New Models for the Cryptanalysis of ASCON
2 months, 3 weeks ago |
www.iacr.org
Note on the cryptanalysis of Speedy
2 months, 4 weeks ago |
www.iacr.org
Preliminary Cryptanalysis of the Biscuit Signature Scheme
3 months, 2 weeks ago |
www.iacr.org
Improved Linear Key Recovery Attacks on PRESENT
3 months, 3 weeks ago |
www.iacr.org
Cryptanalysis of the SNOVA signature scheme
3 months, 3 weeks ago |
www.iacr.org
Improving Shor’s Algorithm
4 months, 1 week ago |
www.schneier.com
GCHQ Christmas Codebreaking Challenge
4 months, 4 weeks ago |
www.schneier.com
Cryptanalysis of QARMAv2
5 months, 2 weeks ago |
www.iacr.org
Another Look at Differential-Linear Attacks
6 months, 2 weeks ago |
www.iacr.org
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1
7 months, 1 week ago |
www.iacr.org
Model Extraction Attack on Neural Networks
7 months, 1 week ago |
www.schneier.com
Model Extraction Attack on Neural Networks
7 months, 1 week ago |
securityboulevard.com
Items published with this topic over the last 90 days.
Latest
Gr\"obner Basis Cryptanalysis of Ciminion and Hydra
1 week, 2 days ago |
arxiv.org
Cryptanalysis of the SIMON Cypher Using Neo4j
1 week, 2 days ago |
arxiv.org
Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem
2 weeks, 5 days ago |
arxiv.org
New Lattice Cryptanalytic Technique
1 month ago |
www.schneier.com
Security Assessment of the LG Cryptosystem
1 month, 1 week ago |
arxiv.org
In Memoriam: Ross Anderson, 1956-2024
1 month, 1 week ago |
www.schneier.com
Optimal s-boxes against alternative operations
1 month, 2 weeks ago |
arxiv.org
Guess and Determine Analysis Based on Set Split
1 month, 3 weeks ago |
www.iacr.org
Mathematics for Post-Quantum Cryptanalysis
2 months, 1 week ago |
www.iacr.org
The legacy of Bletchley Park on UK mathematics
2 months, 1 week ago |
arxiv.org
Improved Differential Meet-In-The-Middle Cryptanalysis
2 months, 2 weeks ago |
www.iacr.org
Apple Announces Post-Quantum Encryption Algorithms for iMessage
2 months, 3 weeks ago |
www.schneier.com
New Models for the Cryptanalysis of ASCON
2 months, 3 weeks ago |
www.iacr.org
Note on the cryptanalysis of Speedy
2 months, 4 weeks ago |
www.iacr.org
Preliminary Cryptanalysis of the Biscuit Signature Scheme
3 months, 2 weeks ago |
www.iacr.org
Improved Linear Key Recovery Attacks on PRESENT
3 months, 3 weeks ago |
www.iacr.org
Cryptanalysis of the SNOVA signature scheme
3 months, 3 weeks ago |
www.iacr.org
Improving Shor’s Algorithm
4 months, 1 week ago |
www.schneier.com
GCHQ Christmas Codebreaking Challenge
4 months, 4 weeks ago |
www.schneier.com
Cryptanalysis of QARMAv2
5 months, 2 weeks ago |
www.iacr.org
Another Look at Differential-Linear Attacks
6 months, 2 weeks ago |
www.iacr.org
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1
7 months, 1 week ago |
www.iacr.org
Model Extraction Attack on Neural Networks
7 months, 1 week ago |
www.schneier.com
Model Extraction Attack on Neural Networks
7 months, 1 week ago |
securityboulevard.com
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Security Operations Manager-West Coast
@ The Walt Disney Company | USA - CA - 2500 Broadway Street
Vulnerability Analyst - Remote (WFH)
@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US
Senior Mainframe Security Administrator
@ Danske Bank | Copenhagen V, Denmark