[Resource Topic] 2024/247: Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
|
|
0
|
161
|
February 16, 2024
|
[Resource Topic] 2024/217: Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption
|
|
0
|
140
|
February 16, 2024
|
[Resource Topic] 2024/199: Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing
|
|
0
|
121
|
February 12, 2024
|
[Resource Topic] 2024/195: PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs
|
|
0
|
166
|
February 9, 2024
|
[Resource Topic] 2024/194: Helium: Scalable MPC among Lightweight Participants and under Churn
|
|
0
|
164
|
February 9, 2024
|
[Resource Topic] 2024/170: Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis
|
|
0
|
172
|
February 6, 2024
|
[Resource Topic] 2024/167: Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack
|
|
0
|
134
|
February 6, 2024
|
[Resource Topic] 2024/147: Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks
|
|
0
|
106
|
February 2, 2024
|
[Resource Topic] 2024/133: Optimizing Implementations of Boolean Functions
|
|
0
|
119
|
January 31, 2024
|
[Resource Topic] 2024/130: HADES: Automated Hardware Design Exploration for Cryptographic Primitives
|
|
0
|
143
|
January 30, 2024
|
[Resource Topic] 2024/121: An acceleration of the AKS prime identification algorithm
|
|
0
|
124
|
January 29, 2024
|
[Resource Topic] 2024/114: Mask Conversions for d+1 shares in Hardware, with Application to Lattice-based PQC
|
|
0
|
143
|
January 29, 2024
|
[Resource Topic] 2024/112: pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers
|
|
0
|
141
|
January 26, 2024
|
[Resource Topic] 2024/095: ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches
|
|
0
|
142
|
January 22, 2024
|
[Resource Topic] 2024/088: Enabling PERK on Resource-Constrained Devices
|
|
0
|
133
|
January 19, 2024
|
[Resource Topic] 2024/085: Simultaneously simple universal and indifferentiable hashing to elliptic curves
|
|
0
|
149
|
January 19, 2024
|
[Resource Topic] 2024/079: On Modular Algorithms and Butterfly Operations in Number Theoretic Transform
|
|
0
|
127
|
January 19, 2024
|
[Resource Topic] 2024/069: SDitH in Hardware
|
|
0
|
123
|
January 17, 2024
|
[Resource Topic] 2024/059: CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors
|
|
0
|
148
|
January 17, 2024
|
[Resource Topic] 2024/057: Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs
|
|
0
|
181
|
January 15, 2024
|
[Resource Topic] 2024/045: A Low-Latency High-Order Arithmetic to Boolean Masking Conversion
|
|
0
|
110
|
January 12, 2024
|
[Resource Topic] 2024/008: SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography
|
|
0
|
165
|
January 5, 2024
|
[Resource Topic] 2024/002: Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs
|
|
0
|
124
|
January 5, 2024
|
[Resource Topic] 2023/1962: SoK: Polynomial Multiplications for Lattice-Based Cryptosystems
|
|
0
|
115
|
December 31, 2023
|
[Resource Topic] 2023/1955: Barrett Multiplication for Dilithium on Embedded Devices
|
|
0
|
115
|
December 25, 2023
|
[Resource Topic] 2023/1924: Analyzing the complexity of reference post-quantum software
|
|
0
|
117
|
December 18, 2023
|
[Resource Topic] 2023/1914: Efficient Low-Latency Masking of Ascon without Fresh Randomness
|
|
0
|
130
|
December 15, 2023
|
[Resource Topic] 2023/1885: Falcon Takes Off - A Hardware Implementation of the Falcon Signature Scheme
|
|
0
|
104
|
December 8, 2023
|
[Resource Topic] 2023/1861: Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
|
|
0
|
113
|
December 6, 2023
|
[Resource Topic] 2023/1856: Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model
|
|
0
|
113
|
December 4, 2023
|