[Resource Topic] 2024/1212: Efficient Layered Circuit for Verification of SHA3 Merkle Tree
|
|
0
|
59
|
July 29, 2024
|
[Resource Topic] 2024/1206: Applying Post-Quantum Cryptography Algorithms to a DLT-Based CBDC Infrastructure: Comparative and Feasibility Analysis
|
|
0
|
61
|
July 29, 2024
|
[Resource Topic] 2024/1204: A fast heuristic for mapping Boolean circuits to functional bootstrapping
|
|
0
|
60
|
July 29, 2024
|
[Resource Topic] 2024/1202: Prover - Toward More Efficient Formal Verification of Masking in Probing Model
|
|
0
|
59
|
July 29, 2024
|
[Resource Topic] 2024/1198: ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA
|
|
0
|
71
|
July 25, 2024
|
[Resource Topic] 2024/1195: Efficient Implementation of Super-optimal Pairings on Curves with Small Prime Fields at the 192-bit Security Level
|
|
0
|
54
|
July 25, 2024
|
[Resource Topic] 2024/1194: Hardware Implementation and Security Analysis of Local-Masked NTT for CRYSTALS-Kyber
|
|
0
|
62
|
July 25, 2024
|
[Resource Topic] 2024/1192: Towards ML-KEM & ML-DSA on OpenTitan
|
|
0
|
65
|
July 25, 2024
|
[Resource Topic] 2024/1180: Fast computation of 2-isogenies in dimension 4 and cryptographic applications
|
|
0
|
51
|
July 25, 2024
|
[Resource Topic] 2024/1170: Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
|
|
0
|
60
|
July 22, 2024
|
[Resource Topic] 2024/1149: Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium
|
|
0
|
58
|
July 19, 2024
|
[Resource Topic] 2024/1131: Jolt-b: recursion friendly Jolt with basefold commitment
|
|
0
|
73
|
July 15, 2024
|
[Resource Topic] 2024/1122: Finding Bugs and Features Using Cryptographically-Informed Functional Testing
|
|
0
|
65
|
July 15, 2024
|
[Resource Topic] 2024/1121: Implementation and Performance Evaluation of Elliptic Curve Cryptography over SECP256R1 on STM32 Microprocessor
|
|
0
|
71
|
July 15, 2024
|
[Resource Topic] 2024/1120: A Fast and Efficient SIKE Co-Design: Coarse-Grained Reconfigurable Accelerators with Custom RISC-V Microcontroller on FPGA
|
|
0
|
54
|
July 15, 2024
|
[Resource Topic] 2024/1107: Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements
|
|
0
|
40
|
July 15, 2024
|
[Resource Topic] 2024/1106: Masked Vector Sampling for HQC
|
|
0
|
49
|
July 15, 2024
|
[Resource Topic] 2024/971: A Note on (2, 2)-isogenies via Theta Coordinates
|
|
0
|
121
|
June 17, 2024
|
[Resource Topic] 2024/925: Time Sharing - A Novel Approach to Low-Latency Masking
|
|
0
|
75
|
June 12, 2024
|
[Resource Topic] 2024/913: SoK: Is Neural Network Hardware Vulnerable to Model Reverse Engineering?
|
|
0
|
102
|
June 8, 2024
|
[Resource Topic] 2024/909: Approximate CRT-Based Gadget Decomposition and Application to TFHE Blind Rotation
|
|
0
|
87
|
June 8, 2024
|
[Resource Topic] 2024/891: Glitch-Stopping Circuits: Hardware Secure Masking without Registers
|
|
0
|
86
|
June 5, 2024
|
[Resource Topic] 2024/889: Analyzing and Benchmarking ZK-Rollups
|
|
0
|
71
|
June 5, 2024
|
[Resource Topic] 2024/887: Secret Key Recovery in a Global-Scale End-to-End Encryption System
|
|
0
|
84
|
June 5, 2024
|
[Resource Topic] 2024/860: HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits
|
|
0
|
55
|
June 5, 2024
|
[Resource Topic] 2024/851: On the parallelization of square-root Vélu's formulas
|
|
0
|
87
|
May 31, 2024
|
[Resource Topic] 2024/833: INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis
|
|
0
|
75
|
May 31, 2024
|
[Resource Topic] 2024/825: KHAN Encryption Algorithm: Leveraging Full Reptend Primes
|
|
0
|
60
|
May 31, 2024
|
[Resource Topic] 2024/779: Elliptic Curve Cryptography for the masses: Simple and fast finite field arithmetic
|
|
0
|
81
|
May 24, 2024
|
[Resource Topic] 2024/768: The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation
|
|
0
|
69
|
May 22, 2024
|