[Resource Topic] 2024/1192: Towards ML-KEM & ML-DSA on OpenTitan
|
|
0
|
76
|
July 25, 2024
|
[Resource Topic] 2024/1180: Fast computation of 2-isogenies in dimension 4 and cryptographic applications
|
|
0
|
58
|
July 25, 2024
|
[Resource Topic] 2024/1170: Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
|
|
0
|
68
|
July 22, 2024
|
[Resource Topic] 2024/1149: Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium
|
|
0
|
63
|
July 19, 2024
|
[Resource Topic] 2024/1131: Jolt-b: recursion friendly Jolt with basefold commitment
|
|
0
|
81
|
July 15, 2024
|
[Resource Topic] 2024/1122: Finding Bugs and Features Using Cryptographically-Informed Functional Testing
|
|
0
|
79
|
July 15, 2024
|
[Resource Topic] 2024/1121: Implementation and Performance Evaluation of Elliptic Curve Cryptography over SECP256R1 on STM32 Microprocessor
|
|
0
|
83
|
July 15, 2024
|
[Resource Topic] 2024/1120: A Fast and Efficient SIKE Co-Design: Coarse-Grained Reconfigurable Accelerators with Custom RISC-V Microcontroller on FPGA
|
|
0
|
62
|
July 15, 2024
|
[Resource Topic] 2024/1107: Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements
|
|
0
|
47
|
July 15, 2024
|
[Resource Topic] 2024/1106: Masked Vector Sampling for HQC
|
|
0
|
60
|
July 15, 2024
|
[Resource Topic] 2024/971: A Note on (2, 2)-isogenies via Theta Coordinates
|
|
0
|
135
|
June 17, 2024
|
[Resource Topic] 2024/925: Time Sharing - A Novel Approach to Low-Latency Masking
|
|
0
|
85
|
June 12, 2024
|
[Resource Topic] 2024/913: SoK: Is Neural Network Hardware Vulnerable to Model Reverse Engineering?
|
|
0
|
128
|
June 8, 2024
|
[Resource Topic] 2024/909: Approximate CRT-Based Gadget Decomposition and Application to TFHE Blind Rotation
|
|
0
|
113
|
June 8, 2024
|
[Resource Topic] 2024/891: Glitch-Stopping Circuits: Hardware Secure Masking without Registers
|
|
0
|
97
|
June 5, 2024
|
[Resource Topic] 2024/889: Analyzing and Benchmarking ZK-Rollups
|
|
0
|
80
|
June 5, 2024
|
[Resource Topic] 2024/887: Secret Key Recovery in a Global-Scale End-to-End Encryption System
|
|
0
|
101
|
June 5, 2024
|
[Resource Topic] 2024/860: HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits
|
|
0
|
66
|
June 5, 2024
|
[Resource Topic] 2024/851: On the parallelization of square-root Vélu's formulas
|
|
0
|
102
|
May 31, 2024
|
[Resource Topic] 2024/833: INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis
|
|
0
|
92
|
May 31, 2024
|
[Resource Topic] 2024/825: KHAN Encryption Algorithm: Leveraging Full Reptend Primes
|
|
0
|
72
|
May 31, 2024
|
[Resource Topic] 2024/779: Elliptic Curve Cryptography for the masses: Simple and fast finite field arithmetic
|
|
0
|
97
|
May 24, 2024
|
[Resource Topic] 2024/768: The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation
|
|
0
|
79
|
May 22, 2024
|
[Resource Topic] 2024/757: Formal Definition and Verification for Combined Random Fault and Random Probing Security
|
|
0
|
92
|
May 20, 2024
|
[Resource Topic] 2024/755: Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice
|
|
0
|
81
|
May 20, 2024
|
[Resource Topic] 2024/750: Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs
|
|
0
|
82
|
May 20, 2024
|
[Resource Topic] 2024/747: Scaling Lattice Sieves across Multiple Machines
|
|
0
|
91
|
May 20, 2024
|
[Resource Topic] 2024/744: An NVMe-based Secure Computing Platform with FPGA-based TFHE Accelerator
|
|
0
|
87
|
May 16, 2024
|
[Resource Topic] 2024/739: BGJ15 Revisited: Sieving with Streamed Memory Access
|
|
0
|
118
|
May 16, 2024
|
[Resource Topic] 2024/708: Automated Generation of Fault-Resistant Circuits
|
|
0
|
125
|
May 10, 2024
|