[Resource Topic] 2024/464: ON THE IMPLEMENTATION OF A LATTICE-BASED DAA FOR VANET SYSTEM
|
|
0
|
15
|
March 22, 2024
|
[Resource Topic] 2024/457: Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern
|
|
0
|
18
|
March 22, 2024
|
[Resource Topic] 2024/451: Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2
|
|
0
|
32
|
March 18, 2024
|
[Resource Topic] 2024/442: Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking
|
|
0
|
23
|
March 15, 2024
|
[Resource Topic] 2024/439: Threshold implementations of cryptographic functions between finite Abelian groups
|
|
0
|
30
|
March 15, 2024
|
[Resource Topic] 2024/396: On the impact of ionizing and non-ionizing irradiation damage on security microcontrollers in CMOS technology
|
|
0
|
25
|
March 5, 2024
|
[Resource Topic] 2024/377: Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking
|
|
0
|
23
|
March 1, 2024
|
[Resource Topic] 2024/367: Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit
|
|
0
|
21
|
March 1, 2024
|
[Resource Topic] 2024/365: Combined Threshold Implementation
|
|
0
|
20
|
March 1, 2024
|
[Resource Topic] 2024/321: Formal Verification of Emulated Floating-Point Arithmetic in Falcon
|
|
0
|
22
|
February 26, 2024
|
[Resource Topic] 2024/314: Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration
|
|
0
|
23
|
February 26, 2024
|
[Resource Topic] 2024/295: An Efficient Hash Function for Imaginary Class Groups
|
|
0
|
34
|
February 23, 2024
|
[Resource Topic] 2024/247: Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
|
|
0
|
32
|
February 16, 2024
|
[Resource Topic] 2024/217: Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption
|
|
0
|
20
|
February 16, 2024
|
[Resource Topic] 2024/199: Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing
|
|
0
|
25
|
February 12, 2024
|
[Resource Topic] 2024/195: PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs
|
|
0
|
33
|
February 9, 2024
|
[Resource Topic] 2024/194: Helium: Scalable MPC among Lightweight Participants and under Churn
|
|
0
|
32
|
February 9, 2024
|
[Resource Topic] 2024/170: Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis
|
|
0
|
28
|
February 6, 2024
|
[Resource Topic] 2024/167: Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack
|
|
0
|
35
|
February 6, 2024
|
[Resource Topic] 2024/147: Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks
|
|
0
|
33
|
February 2, 2024
|
[Resource Topic] 2024/133: Optimizing Implementations of Boolean Functions
|
|
0
|
32
|
January 31, 2024
|
[Resource Topic] 2024/130: HADES: Automated Hardware Design Exploration for Cryptographic Primitives
|
|
0
|
34
|
January 30, 2024
|
[Resource Topic] 2024/121: An acceleration of the AKS prime identification algorithm
|
|
0
|
32
|
January 29, 2024
|
[Resource Topic] 2024/114: Mask Conversions for d+1 shares in Hardware, with Application to Lattice-based PQC
|
|
0
|
41
|
January 29, 2024
|
[Resource Topic] 2024/112: pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers
|
|
0
|
38
|
January 26, 2024
|
[Resource Topic] 2024/095: ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches
|
|
0
|
39
|
January 22, 2024
|
[Resource Topic] 2024/088: Enabling PERK on Resource-Constrained Devices
|
|
0
|
39
|
January 19, 2024
|
[Resource Topic] 2024/085: Simultaneously simple universal and indifferentiable hashing to elliptic curves
|
|
0
|
32
|
January 19, 2024
|
[Resource Topic] 2024/079: On Modular Algorithms and Butterfly Operations in Number Theoretic Transform
|
|
0
|
36
|
January 19, 2024
|
[Resource Topic] 2024/069: SDitH in Hardware
|
|
0
|
32
|
January 17, 2024
|