11 – 20 of 230
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Efficient Security Protocols for Constrained Devices
2023) In EIT series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
-
Mark
Non-Fungible Tokens as a Framework for Sustainable Innovation in Pharmaceutical R&D: A Smart Contract-Based Platform for Data Sharing and Rightsholder Protection
2023) In International Review of Law, Computers & Technology(
- Contribution to journal › Article
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(
- Contribution to journal › Article
-
Mark
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
(
- Contribution to journal › Article
-
Mark
Taming Cloud Integrated Systems in the Wild
2023)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Correlation Attacks on Stream Ciphers
2023) p.143-154(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
PrSLoc : Sybil attack detection for localization with private observers using differential privacy
(
- Contribution to journal › Article
-
Mark
Improved Estimation of Key Enumeration with Applications to Solving LWE
2023) 2023 International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
(
- Contribution to journal › Article