|
1021 |
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2024, 2024, Nr. 2
|
|
|
1022 |
SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2024, 2024, Nr. 2
|
|
|
1023 |
Single trace HQC shared key recovery with SASCA Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2024, 2024, Nr. 2
|
|
|
1024 |
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2024, 2024, Nr. 2
|
|
|
1025 |
UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2024, 2024, Nr. 2
|
|
|
1026 |
Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds Enthalten in IACR transactions on symmetric cryptology Bd. 2024, 2024, Nr. 1
|
|
|
1027 |
Constructing Committing and Leakage-Resilient Authenticated Encryption Enthalten in IACR transactions on symmetric cryptology Bd. 2024, 2024, Nr. 1
|
|
|
1028 |
Cryptanalysis of QARMAv2 Enthalten in IACR transactions on symmetric cryptology Bd. 2024, 2024, Nr. 1
|
|
|
1029 |
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation Enthalten in IACR transactions on symmetric cryptology Bd. 2024, 2024, Nr. 1
|
|
|
1030 |
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing Enthalten in IACR transactions on symmetric cryptology Bd. 2024, 2024, Nr. 1
|
|