1 – 10 of 166
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2023
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
2023)(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Preface
2023) Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, Proceedings In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14154 LNCS.(
- Chapter in Book/Report/Conference proceeding › Preface to conference proceeding
-
Mark
Correlation Attacks on Stream Ciphers
2023) p.143-154(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2022
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article