Networks and Security
1 – 10 of 262
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2025
-
Mark
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
- Contribution to journal › Article
-
Mark
On the Trustworthiness of Trusted Third Parties
(2025) In Series of licentiate and doctoral theses
- Thesis › Doctoral thesis (compilation)
-
Mark
A Trust Establishment and Key Management Architecture for Hospital-at-Home
- Contribution to journal › Article
-
Mark
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD : More Applications of Pseudo-Random Injections
- Working paper/Preprint › Preprint in preprint archive
-
Mark
Fast Parallelizable Misuse-Resistant Authenticated Encryption : Low Latency (Decryption-Fast) SIV
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem
(2025)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Generic Framework for Side-Channel Attacks Against LWE-Based Cryptosystems
(2025) 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025 In Lecture Notes in Computer Science 15608. p.3-32
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates
- Contribution to journal › Article
-
Mark
AoA and AoI in Modern Industrial Control
(2025) In 2025 IEEE Wireless Communications and Networking Conference (WCNC)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Number of the Beast : Reducing Additions in Fast Matrix Multiplication Algorithms for Dimensions up to 666
(2025) p.47-60
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
