-
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool
ePrint Report: Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool Jianing Zhang, Haoyang Wang Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al. in 2014, there have been no substantial advancements in the key recovery…
-
Error floor prediction with Markov models for QC-MDPC codes
ePrint Report: Error floor prediction with Markov models for QC-MDPC codes Sarah Arpin, Jun Bo Lau, Ray Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur Quasi-cyclic moderate-density parity check (QC-MDPC) code-based encryption schemes under iterative decoders offer highly-competitive performance in the quantum-resistant space of cryptography, but the decoding-failure rate (DFR) of these algorithms are not well-understood.…
-
Shadowfax: Combiners for Deniability
ePrint Report: Shadowfax: Combiners for Deniability Phillip Gajland, Vincent Hwang, Jonas Janneck As cryptographic protocols transition to post-quantum security, most adopt hybrid solutions combining pre-quantum and post-quantum assumptions. However, this shift often introduces trade-offs in terms of efficiency, compactness, and in some cases, even security. One such example is deniability, which enables users, such as…
-
Quantum function secret sharing
ePrint Report: Quantum function secret sharing Alex B. Grilo, Ramis Movassagh We propose a quantum function secret sharing scheme in which the communication is exclusively classical. In this primitive, a classical dealer distributes a secret quantum circuit $C$ by providing shares to $p$ quantum parties. The parties on an input state $ket{psi}$ and a projection…
-
Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World
ePrint Report: Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay We propose the first $textit{distributed}$ version of a simple, efficient, and provably quantum-safe pseudorandom function (PRF). The distributed PRF (DPRF) supports arbitrary threshold access structures based on the hardness of the well-studied Learning with Rounding…
-
Researcher in Cryptographic Protocols and Key Exchange
Job Posting: Researcher in Cryptographic Protocols and Key Exchange Technology Innovation Institute (TII), Abu Dhabi, UAE We are looking for a permanent researcher to join the Cryptographic Protocols team within the Cryptography Research Center (CRC) at TII. The main task of the team is to conduct applied academic research and assist in product development, spanning…
-
CVE-2025-25066 – Cisco nDPI Stack Buffer Overflow Vulnerability
CVE ID : CVE-2025-25066 Published : Feb. 3, 2025, 6:15 a.m. | 1 hour, 49 minutes ago Description : nDPI through 4.12 has a potential stack-based buffer overflow in ndpi_address_cache_restore in lib/ndpi_cache.c. Severity: 8.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more… Go to Source
-
CVE-2024-10395 – Apache HTTP Server Input Validation Vulnerability
CVE ID : CVE-2024-10395 Published : Feb. 3, 2025, 7:15 a.m. | 49 minutes ago Description : No proper validation of the length of user input in http_server_get_content_type_from_extension. Severity: 8.6 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more… Go to Source
-
CVE-2025-0366 – “Jupiter X Core WordPress Remote Code Execution Vulnerability”
CVE ID : CVE-2025-0366 Published : Feb. 1, 2025, 6:15 a.m. | 2 days, 1 hour ago Description : The Jupiter X Core plugin for WordPress is vulnerable to Local File Inclusion to Remote Code Execution in all versions up to, and including, 4.8.7 via the get_svg() function. This makes it possible for authenticated attackers, with Contributor-level…
-
Medical monitoring machines spotted stealing patient data, users warned to pull the plug ASAP
Medical monitoring machines spotted stealing patient data, users warned to pull the plug ASAP Infosec in brief The United States Food and Drug Administration has told medical facilities and caregivers that monitor patients using Contec equipment to disconnect the devices from the internet ASAP … Read more Published Date: Feb 03, 2025 (6 hours, 17 minutes ago)…