11 – 20 of 270
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Preface
2022) 13th International Conference on Post-Quantum Cryptography, PQCrypto 2022 In Lecture Notes in Computer Science 13512 LNCS.(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Attacks on the Firekite Cipher
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
- 2021
-
Mark
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
2021) 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021 In Lecture Notes in Computer Science 13093. p.33-62(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved guess-and-determine and distinguishing attacks on snow-v
(
- Contribution to journal › Article
-
Mark
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
2021) 2021 IEEE International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article