1 – 8 of 8
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(
- Contribution to journal › Article
-
Mark
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
2023)(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
(
- Contribution to journal › Article
- 2022
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
- 2019
-
Mark
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
2019)(
- Working paper/Preprint › Preprint in preprint archive