Secure and Networked Systems
21 – 30 of 35
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Fast Parallelizable Misuse-Resistant Authenticated Encryption : Low Latency (Decryption-Fast) SIV
2024) Selected Areas in Cryptography 2024(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further improvements of the estimation of key enumeration with applications to solving LWE
(
- Contribution to journal › Article
-
Mark
Analysis and design of a GHz bandwidth adaptive bias circuit for an mmW Doherty amplifier
(
- Contribution to journal › Article
-
Mark
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
uKNIT: Breaking Round-alignment for Cipher Design : Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher
(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
M2SKD : Multi-to-Single Knowledge Distillation of Real-Time Epileptic Seizure Detection for Low-Power Wearable Systems
(
- Contribution to journal › Article
-
Mark
Privacy-preserving edge federated learning for intelligent mobile-health systems
(
- Contribution to journal › Article
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
(
- Contribution to journal › Article