81 – 90 of 258
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing
2022) 2022 IEEE International Symposium on Secure and Private Execution Environment Design p.109-120(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
-
Mark
Secure Cloud Storage with Joint Deduplication and Erasure Protection
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks
2022) The 17th International Conference on Information Security Practice and Experience (ISPEC 2022) In Lecture Notes in Computer Science 13620.(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Count Me In! Extendability for Threshold Ring Signatures
2022) 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2022 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13178. p.379-406(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Finding Collisions against 4-Round SHA-3-384 in Practical Time
(
- Contribution to journal › Article
-
Mark
LbSP : Load-Balanced Secure and Private Autonomous Electric Vehicle Charging Framework With Online Price Optimization
(
- Contribution to journal › Article
-
Mark
Bifrost : A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding