Cited in
(10)- SIKE
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- First full-fledged side channel attack on HMAC-SHA-2
- Romulus
- Lightweight authenticated encryption mode suitable for threshold implementation
- ISAP
- NanGate
- An evaluation of the equivalent inverter modeling approach
- vOW4SIKE
- VexRiscv
This page was built for software: FreePDK45