|
151 |
Constant-Cycle Hardware Private Circuits Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
152 |
Entropy extractor based high-throughput post-processings for True Random Number Generators Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
153 |
Fast AVX-512 Implementation of the Optimal Ate Pairing on BLS12-381 Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
154 |
Fault Injection Evaluation with Statistical Analysis Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
155 |
HADES: Automated Hardware Design Exploration for Cryptographic Primitives Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
156 |
Let us walk on the 3-isogeny graph: efficient, fast, and simple Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
157 |
mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
158 |
Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
159 |
Quantum security analysis of Module-LWE PQC based on practical cost estimates Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
160 |
Rejected Signatures’ Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|