Publication | Date of Publication | Type |
---|
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware | 2024-04-26 | Paper |
Finding and evaluating parameters for BGV | 2024-02-02 | Paper |
Secure Implementation of Lattice-Based Encryption Schemes | 2024-01-23 | Paper |
A holistic approach towards side-channel secure fixed-weight polynomial sampling | 2023-11-16 | Paper |
Efficiently masking polynomial inversion at arbitrary order | 2023-07-07 | Paper |
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices | 2022-08-05 | Paper |
Deep neural network attribution methods for leakage analysis and symmetric key recovery | 2020-07-21 | Paper |
Implementing the NewHope-simple key exchange on low-cost FPGAs | 2020-03-02 | Paper |
Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto | 2020-01-28 | Paper |
Profiled power analysis attacks using convolutional neural networks with domain knowledge | 2019-02-20 | Paper |
GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs | 2018-06-27 | Paper |
White-Box Cryptography in the Gray Box | 2018-05-09 | Paper |
CAKE: CODE-based algorithm for key encapsulation | 2018-04-20 | Paper |
Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms | 2018-02-16 | Paper |
Strong 8-bit sboxes with efficient masking in hardware | 2018-02-14 | Paper |
Cryptanalysis with COPACOBANA | 2017-08-08 | Paper |
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA | 2017-05-19 | Paper |
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware | 2017-05-16 | Paper |
Hiding Higher-Order Side-Channel Leakage | 2017-04-12 | Paper |
ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks | 2016-10-27 | Paper |
Affine Equivalence and Its Application to Tightening Threshold Implementations | 2016-05-19 | Paper |
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter | 2016-04-26 | Paper |
Arithmetic Addition over Boolean Masking | 2016-03-10 | Paper |
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware | 2015-10-01 | Paper |
High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers | 2015-09-17 | Paper |
High-Speed Signatures from Standard Lattices | 2015-09-17 | Paper |
Enhanced Lattice-Based Signatures on Reconfigurable Hardware | 2015-07-21 | Paper |
Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices | 2015-01-14 | Paper |
Embedded Syndrome-Based Hashing | 2014-08-20 | Paper |
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices | 2013-10-10 | Paper |
Software Speed Records for Lattice-Based Signatures | 2013-06-14 | Paper |
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications | 2013-03-19 | Paper |
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems | 2012-11-13 | Paper |
Full Lattice Basis Reduction on Graphics Cards | 2012-10-16 | Paper |
Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware | 2012-09-21 | Paper |
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices | 2012-07-23 | Paper |
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware | 2011-12-02 | Paper |
Generic Side-Channel Countermeasures for Reconfigurable Devices | 2011-10-07 | Paper |
MicroEliece: McEliece for Embedded Devices | 2009-11-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3601147 | 2009-02-09 | Paper |
Efficient Hash Collision Search Strategies on Special-Purpose Hardware | 2009-01-22 | Paper |
Exploiting the Power of GPUs for Asymmetric Cryptography | 2009-01-09 | Paper |
Efficient hardware implementation of finite fields with applications to cryptography | 2006-11-06 | Paper |