|
421 |
Fault Attacks on VOLEitH Signature Schemes Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|
|
422 |
High Fidelity Security Mesh Monitoring using Low-Cost, Embedded Time Domain Reflectometry Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|
|
423 |
Keep it Simple: Refreshing the NTT of Kyber’s Decapsulation to Prevent Plaintext-Checking Side-Channel Attacks Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|
|
424 |
ML-DSA masking sweetened with SUCRE: Shuffle-and-Unmask Countermeasure for REjection sampling Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|
|
425 |
NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3 Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|
|
426 |
PWNN: Power-Wasting Neural Network As Remote Fault Injector Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|
|
427 |
Scalable Information Theoretic Evaluation of the Rank Statistics in Side-Channel Attacks Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|
|
428 |
Testing Security Equivalence in the Random Probing Model Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|
|
429 |
WW-FL: Secure and Private Large-Scale Federated Learning Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|
|
430 |
YATA: Yet Another TFHE Accelerator with Key Compression and Radix-8 NTT Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
|
|