11 – 20 of 172
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
- Contribution to journal › Article
-
Mark
Correlation Attacks on Stream Ciphers
(2023) p.143-154
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2022
-
Mark
Attacks on the Firekite Cipher
- Contribution to journal › Article
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
(2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
(2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827
- Contribution to journal › Article
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
- Contribution to journal › Article
-
Mark
Preface
(2022) 13th International Conference on Post-Quantum Cryptography, PQCrypto 2022 In Lecture Notes in Computer Science 13512 LNCS.
- Contribution to journal › Debate/Note/Editorial
- 2021
-
Mark
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
(2021) 2021 IEEE International Symposium on Information Theory
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improvements on Making BKW Practical for Solving LWE
- Contribution to journal › Article
