|
161 |
TESLA: Trusted Execution Support for Legacy Embedded Applications Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
162 |
Attacking Split-and-Lookup-Based Primitives Using Probabilistic Polynomial System Solving Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
|
|
|
163 |
Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
164 |
Cymric: Short-tailed but Mighty Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
165 |
Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
166 |
HCTR+: An Optimally Secure TBC-Based Accordion Mode Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
|
|
|
167 |
HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
168 |
KeyVisor – A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
169 |
LEAP: High-Performance Lattice-Based Pseudorandom Number Generator Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
|
|
|
170 |
Minimized PRFs from Public Permutations Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
|
|