21 – 30 of 172
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2021
-
Mark
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
2021) 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021 In Lecture Notes in Computer Science 13093. p.33-62(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEAD, Round 3 Tweak and Motivation
2021)(
- Book/Report › Report
-
Mark
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
- 2020
-
Mark
Solving LPN Using Covering Codes
(
- Contribution to journal › Article
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Spectral analysis of ZUC-256
(
- Contribution to journal › Article
-
Mark
An overview of cryptographic primitives for possible use in 5G and beyond
(
- Contribution to journal › Scientific review