💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 4, showing 50 papers

# Paper Cause of Death Category Citations Published
151 Sequences with small correlation
Kai-Uwe Schmidt
👻 Ghosted cs.IT 47 10 years ago
152 One-Wayness in Quantum Cryptography
Tomoyuki Morimae, Takashi Yamakawa
👻 Ghosted quant-ph 47 3 years ago
153 FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models
Songze Li, Duanyi Yao, Jin Liu
👻 Ghosted cs.LG 46 3 years ago
154 Improved torsion point attacks on SIDH variants
Victoria de Quehen, Péter Kutas, ... (+5 more)
👻 Ghosted math.NT 46 5 years ago
155 Interdiction in Practice -- Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski, Marc Fyrbiak, ... (+3 more)
👻 Ghosted cs.CR 46 6 years ago
156 Quantum authentication with key recycling
Christopher Portmann
👻 Ghosted quant-ph 46 9 years ago
157 Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
Gorjan Alagic, Alexander Russell
👻 Ghosted quant-ph 46 9 years ago
158 No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices
Riccardo Spolaor, Laila Abudahi, ... (+3 more)
👻 Ghosted cs.CR 46 9 years ago
159 Extension of Overbeck's Attack for Gabidulin Based Cryptosystems
Anna-Lena Horlemann-Trautmann, Kyle Marshall, Joachim Rosenthal
👻 Ghosted cs.CR 46 10 years ago
160 Rank distribution of Delsarte codes
Javier de la Cruz, Elisa Gorla, ... (+2 more)
👻 Ghosted cs.IT 46 10 years ago
161 Some new results on permutation polynomials over finite fields
Jingxue Ma, Tao Zhang, ... (+2 more)
👻 Ghosted cs.IT 46 10 years ago
162 Cryptography using generalized Fibonacci matrices with Affine-Hill cipher
Kalika Prasad, Hrishikesh Mahato
👻 Ghosted cs.CR 45 6 years ago
163 How to profit from payments channels
Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin
👻 Ghosted cs.DC 45 6 years ago
164 Secure Multi-party Quantum Computation with a Dishonest Majority
Yfke Dulek, Alex B. Grilo, ... (+3 more)
👻 Ghosted quant-ph 45 6 years ago
165 Monetary Stabilization in Cryptocurrencies - Design Approaches and Open Questions
Ingolf G. A. Pernice, Sebastian Henningsen, ... (+4 more)
👻 Ghosted q-fin.GN 45 6 years ago
166 Quantum-secure message authentication via blind-unforgeability
Gorjan Alagic, Christian Majenz, ... (+2 more)
👻 Ghosted quant-ph 45 8 years ago
167 Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions
Sreeja Chowdhury, Ana Covic, ... (+4 more)
👻 Ghosted cs.CR 44 5 years ago
168 Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLA
Philip B. Stark
👻 Ghosted stat.AP 44 6 years ago
169 Non-interactive zero-knowledge arguments for QMA, with preprocessing
Andrea Coladangelo, Thomas Vidick, Tina Zhang
👻 Ghosted quant-ph 44 6 years ago
170 Applications of Machine Learning in Cryptography: A Survey
Mohammed M. Alani
👻 Ghosted cs.CR 44 7 years ago
171 An intrinsical description of group codes
José Joaquín Bernal, Ángel del Río, Juan Jacobo Simón
👻 Ghosted cs.IT 43 2 years ago
172 NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Yehuda Afek, Anat Bremler-Barr, Lior Shafir
👻 Ghosted cs.CR 43 5 years ago
173 Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
Ziaur Rahman, Xun Yi, ... (+3 more)
👻 Ghosted cs.CR 43 4 years ago
174 Quantum Advantage from Any Non-Local Game
Yael Kalai, Alex Lombardi, ... (+2 more)
👻 Ghosted quant-ph 43 4 years ago
175 Exploring Blockchain Technology through a Modular Lens: A Survey
Minghui Xu, Yihao Guo, ... (+6 more)
👻 Ghosted cs.CR 42 3 years ago
176 A general framework for secondary constructions of bent and plateaued functions
S. Hodžić, E. Pasalic, Y. Wei
👻 Ghosted cs.IT 42 7 years ago
177 On the minimum weights of binary linear complementary dual codes
Makoto Araya, Masaaki Harada
🔮 The Ethereal math.CO 42 7 years ago
178 Sustained Space Complexity
Joel Alwen, Jeremiah Blocki, Krzysztof Pietrzak
👻 Ghosted cs.CR 42 8 years ago
179 On self-dual double circulant codes
Adel Alahmadi, Funda Özdemir, Patrick Solé
👻 Ghosted cs.IT 42 10 years ago
180 The supersingular Endomorphism Ring and One Endomorphism problems are equivalent
Aurel Page, Benjamin Wesolowski
👻 Ghosted cs.CR 42 2 years ago
181 Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications
Prabhanjan Ananth, Aditya Gulati, ... (+2 more)
👻 Ghosted quant-ph 42 3 years ago
182 Time to Bribe: Measuring Block Construction Market
Anton Wahrstätter, Liyi Zhou, ... (+3 more)
👻 Ghosted cs.NI 41 2 years ago
183 What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
Alex Groce, Josselin Feist, ... (+2 more)
👻 Ghosted cs.SE 41 6 years ago
184 SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies
Sarah Azouvi, Alexander Hicks
👻 Ghosted cs.CR 41 6 years ago
185 A Scale-out Blockchain for Value Transfer with Spontaneous Sharding
Zhijie Ren, Kelong Cong, ... (+4 more)
👻 Ghosted cs.DC 41 8 years ago
186 Unforgeable Quantum Encryption
Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
👻 Ghosted quant-ph 41 8 years ago
187 Optimal Key Consensus in Presence of Noise
Zhengzhong Jin, Yunlei Zhao
👻 Ghosted cs.IT 41 9 years ago
188 Improved Cryptanalysis of Rank Metric Schemes Based on Gabidulin Codes
Ayoub Otmani, Hervé Talé Kalachi, Sélestin Ndjeya
👻 Ghosted cs.CR 41 10 years ago
189 Some classes of power functions with low c-differential uniformity over finite fields
Zhengbang Zha, Lei Hu
👻 Ghosted cs.IT 40 5 years ago
190 Scattered subspaces and related codes
Giovanni Zini, Ferdinando Zullo
🔮 The Ethereal math.CO 40 5 years ago
191 Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Jan Czajkowski, Christian Majenz, ... (+2 more)
👻 Ghosted quant-ph 40 7 years ago
192 QFactory: classically-instructed remote secret qubits preparation
Alexandru Cojocaru, Léo Colisson, ... (+2 more)
👻 Ghosted quant-ph 40 7 years ago
193 A Polynomial-Time Attack on the BBCRS Scheme
Alain Couvreur, Ayoub Otmani, ... (+2 more)
👻 Ghosted cs.CR 40 11 years ago
194 FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption
Michiel Van Beirendonck, Jan-Pieter D'Anvers, ... (+2 more)
👻 Ghosted cs.CR 40 3 years ago
195 Classical Verification of Quantum Computations with Efficient Verifier
Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
👻 Ghosted quant-ph 39 6 years ago
196 Slide Reduction, Revisited---Filling the Gaps in SVP Approximation
Divesh Aggarwal, Jianwei Li, ... (+2 more)
👻 Ghosted cs.DS 39 6 years ago
197 Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application
Satsuya Ohata, Koji Nuida
👻 Ghosted cs.CR 39 6 years ago
198 Do non-free LCD codes over finite commutative Frobenius rings exist?
Sanjit Bhowmick, Alexandre Fotue-Tabue, ... (+3 more)
👻 Ghosted cs.IT 39 7 years ago
199 Sample Efficient Algorithms for Learning Quantum Channels in PAC Model and the Approximate State Discrimination Problem
Kai-Min Chung, Han-Hsuan Lin
👻 Ghosted quant-ph 39 7 years ago
200 Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions
Sajjad Arshad, Amin Kharraz, William Robertson
👻 Ghosted cs.CR 39 7 years ago