Secure and Networked Systems
1 – 10 of 50
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2025
-
Mark
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
- Contribution to journal › Article
-
Mark
On the Trustworthiness of Trusted Third Parties
(2025) In Series of licentiate and doctoral theses
- Thesis › Doctoral thesis (compilation)
-
Mark
A Trust Establishment and Key Management Architecture for Hospital-at-Home
- Contribution to journal › Article
-
Mark
Fast Parallelizable Misuse-Resistant Authenticated Encryption : Low Latency (Decryption-Fast) SIV
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD : More Applications of Pseudo-Random Injections
- Working paper/Preprint › Preprint in preprint archive
-
Mark
Binary Forward-Only Algorithms
- Contribution to journal › Article
-
Mark
Demystifying AMD SEV Performance Penalty for NFV Deployment
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Principles and Solutions for Improved Availability and Code Vulnerability Detection
(2025)
- Thesis › Doctoral thesis (compilation)
-
Mark
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem
(2025) 10th IEEE European Symposium on Security and Privacy, Euro S and P
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Formal Analysis of Julia Key Agreement Protocol
(2025) 26th International Conference on Information and Communications Security, ICICS 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 15057 LNCS. p.171-190
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
