21 – 30 of 172
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2021
-
Mark
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
-
Mark
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
2021) 2021 IEEE International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
Solving LPN Using Covering Codes
(
- Contribution to journal › Article
-
Mark
A New Decryption Failure Attack Against HQC
2020) 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020 In Lecture Notes in Computer Science 12491. p.353-382(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Making the BKW Algorithm Practical for LWE
2020) International Conference on Cryptology in India - INDOCRYPT 2020 In Lecture Notes in Computer Science 12578. p.417-439(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An overview of cryptographic primitives for possible use in 5G and beyond
(
- Contribution to journal › Scientific review
-
Mark
Spectral analysis of ZUC-256
(
- Contribution to journal › Article
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding