|
181 |
TREE: Bridging the gap between reconfigurable computing and secure execution Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
|
|
|
182 |
A Code-Based ISE to Protect Boolean Masking in Software Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|
|
183 |
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|
|
184 |
Higher-Order Time Sharing Masking Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|
|
185 |
Improving MPCitH with Preprocessing: Mask Is All You Need Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|
|
186 |
Information Theoretic Analysis of PUF-Based Tamper Protection Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|
|
187 |
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|
|
188 |
MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4 Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|
|
189 |
Multiple Rows Mixers and Hsilu Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 2
|
|
|
190 |
New Quantum Cryptanalysis of Binary Elliptic Curves Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
|
|