1 – 10 of 16
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2023
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(
- Contribution to journal › Article
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
- 2022
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article
- 2021
-
Mark
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
2021) 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021 In Lecture Notes in Computer Science 13093. p.33-62(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
- 2020
-
Mark
Solving LPN Using Covering Codes
(
- Contribution to journal › Article