|
161 |
HADES: Automated Hardware Design Exploration for Cryptographic Primitives Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
162 |
Let us walk on the 3-isogeny graph: efficient, fast, and simple Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
163 |
mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
164 |
Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
165 |
Quantum security analysis of Module-LWE PQC based on practical cost estimates Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
166 |
Rejected Signatures’ Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
167 |
TESLA: Trusted Execution Support for Legacy Embedded Applications Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
168 |
Attacking Split-and-Lookup-Based Primitives Using Probabilistic Polynomial System Solving Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
|
|
|
169 |
Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
170 |
Cymric: Short-tailed but Mighty Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|