|
171 |
Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
172 |
Quantum security analysis of Module-LWE PQC based on practical cost estimates Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
173 |
Rejected Signatures’ Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
174 |
TESLA: Trusted Execution Support for Legacy Embedded Applications Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
175 |
Attacking Split-and-Lookup-Based Primitives Using Probabilistic Polynomial System Solving Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
|
|
|
176 |
Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
177 |
Cymric: Short-tailed but Mighty Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
178 |
Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
179 |
HCTR+: An Optimally Secure TBC-Based Accordion Mode Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
|
|
|
180 |
HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|