21 – 30 of 172
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2021
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
- Contribution to journal › Article
-
Mark
Improved guess-and-determine and distinguishing attacks on snow-v
- Contribution to journal › Article
-
Mark
SNOW-Vi : An extreme performance variant of SNOW-V for lower grade CPUs
(2021) 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021 p.261-272
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
(2021) 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021 In Lecture Notes in Computer Science 13093. p.33-62
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEAD, Round 3 Tweak and Motivation
(2021)
- Book/Report › Report
- 2020
-
Mark
Spectral analysis of ZUC-256
- Contribution to journal › Article
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
(2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Solving LPN Using Covering Codes
- Contribution to journal › Article
-
Mark
An overview of cryptographic primitives for possible use in 5G and beyond
- Contribution to journal › Scientific review
