[Resource Topic] 2025/601: PHOENIX: Crypto-Agile Hardware Sharing for ML-KEM and HQC
|
|
0
|
0
|
April 4, 2025
|
[Resource Topic] 2025/570: Partial Key Overwrite Attacks in Microcontrollers: a Survey
|
|
0
|
1
|
April 1, 2025
|
[Resource Topic] 2025/568: An in-depth security evaluation of the Nintendo DSi gaming console
|
|
0
|
0
|
March 31, 2025
|
[Resource Topic] 2025/564: Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/563: An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/553: HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction
|
|
0
|
0
|
March 27, 2025
|
[Resource Topic] 2025/523: Assembly optimised Curve25519 and Curve448 implementations for ARM Cortex-M4 and Cortex-M33
|
|
0
|
0
|
March 21, 2025
|
[Resource Topic] 2025/519: mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software
|
|
0
|
0
|
March 21, 2025
|
[Resource Topic] 2025/512: Optimizing AES-GCM on ARM Cortex-M4: A Fixslicing and FACE-Based Approach
|
|
0
|
1
|
March 21, 2025
|
[Resource Topic] 2025/503: Max Bias Analysis: A New Approach on Computing the Entropy of Free Ring-Oscillator
|
|
0
|
0
|
March 19, 2025
|
[Resource Topic] 2025/498: Scoop: An Optimizer for Profiling Attacks against Higher-Order Masking
|
|
0
|
0
|
March 17, 2025
|
[Resource Topic] 2025/497: Fast Scloud+: A Fast Hardware Implementation for the Unstructured LWE-based KEM - Scloud+
|
|
0
|
3
|
March 17, 2025
|
[Resource Topic] 2025/487: webSPDZ: Versatile MPC on the Web
|
|
0
|
2
|
March 17, 2025
|
[Resource Topic] 2025/479: Post Quantum Migration of Tor
|
|
0
|
1
|
March 14, 2025
|
[Resource Topic] 2025/478: Attacking Single-Cycle Ciphers on Modern FPGAs featuring Explainable Deep Learning
|
|
0
|
1
|
March 14, 2025
|
[Resource Topic] 2025/467: PMNS arithmetic for elliptic curve cryptography
|
|
0
|
1
|
March 13, 2025
|
[Resource Topic] 2025/464: SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
|
|
0
|
1
|
March 12, 2025
|
[Resource Topic] 2025/455: StaMAC: Fault Protection via Stable-MAC Tags
|
|
0
|
0
|
March 12, 2025
|
[Resource Topic] 2025/435: Constant-Time Code: The Pessimist Case
|
|
0
|
1
|
March 8, 2025
|
[Resource Topic] 2025/433: MIDAS: an End-to-end CAD Framework for Automating Combinational Logic Locking
|
|
0
|
0
|
March 8, 2025
|
[Resource Topic] 2025/417: Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using Homomorphic Encryption
|
|
0
|
1
|
March 5, 2025
|
[Resource Topic] 2025/366: Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY
|
|
0
|
1
|
March 4, 2025
|
[Resource Topic] 2025/338: CT-LLVM: Automatic Large-Scale Constant-Time Analysis
|
|
0
|
0
|
February 25, 2025
|
[Resource Topic] 2025/337: Efficient IP Masking with Generic Security Guarantees under Minimum Assumptions
|
|
0
|
0
|
February 25, 2025
|
[Resource Topic] 2025/298: Stateless Hash-Based Signatures for Post-Quantum Security Keys
|
|
0
|
1
|
February 21, 2025
|
[Resource Topic] 2025/273: Clustering Approach for Higher-Order Deterministic Masking
|
|
0
|
1
|
February 18, 2025
|
[Resource Topic] 2025/270: A Decomposition Approach for Evaluating Security of Masking
|
|
0
|
1
|
February 18, 2025
|
[Resource Topic] 2025/260: Quantum Security Evaluation of ASCON
|
|
0
|
3
|
February 18, 2025
|
[Resource Topic] 2025/255: Tighter Security Notions for a Modular Approach to Private Circuits
|
|
0
|
2
|
February 18, 2025
|
[Resource Topic] 2025/252: Chiplet-Based Techniques for Scalable and Memory-Aware Multi-Scalar Multiplication
|
|
0
|
0
|
February 18, 2025
|