The following pages link to Tim Güneysu (Q778966):
Displaying 38 items.
- Deep neural network attribution methods for leakage analysis and symmetric key recovery (Q778967) (← links)
- Efficient hardware implementation of finite fields with applications to cryptography (Q850794) (← links)
- Strong 8-bit sboxes with efficient masking in hardware (Q1695970) (← links)
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Profiled power analysis attacks using convolutional neural networks with domain knowledge (Q1726696) (← links)
- CAKE: CODE-based algorithm for key encapsulation (Q1744856) (← links)
- Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto (Q2289445) (← links)
- Implementing the NewHope-simple key exchange on low-cost FPGAs (Q2303099) (← links)
- Arithmetic Addition over Boolean Masking (Q2794517) (← links)
- IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter (Q2802598) (← links)
- Affine Equivalence and Its Application to Tightening Threshold Implementations (Q2807212) (← links)
- ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks (Q2829219) (← links)
- Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices (Q2851421) (← links)
- Embedded Syndrome-Based Hashing (Q2876941) (← links)
- Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices (Q2900618) (← links)
- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware (Q2915119) (← links)
- Full Lattice Basis Reduction on Graphics Cards (Q2920408) (← links)
- Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices (Q2938688) (← links)
- High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers (Q2946459) (← links)
- High-Speed Signatures from Standard Lattices (Q2946468) (← links)
- Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware (Q2949523) (← links)
- Hiding Higher-Order Side-Channel Leakage (Q2975801) (← links)
- Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware (Q2982200) (← links)
- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA (Q2988331) (← links)
- An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware (Q3102195) (← links)
- Generic Side-Channel Countermeasures for Reconfigurable Devices (Q3172963) (← links)
- (Q3601147) (← links)
- MicroEliece: McEliece for Embedded Devices (Q3642921) (← links)
- GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs (Q4567315) (← links)
- White-Box Cryptography in the Gray Box (Q4639477) (← links)
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems (Q4649797) (← links)
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications (Q4911587) (← links)
- Software Speed Records for Lattice-Based Signatures (Q4928589) (← links)
- Cryptanalysis with COPACOBANA (Q4975070) (← links)
- Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices (Q5095082) (← links)
- Enhanced Lattice-Based Signatures on Reconfigurable Hardware (Q5265087) (← links)
- Exploiting the Power of GPUs for Asymmetric Cryptography (Q5502784) (← links)
- Efficient Hash Collision Search Strategies on Special-Purpose Hardware (Q5504548) (← links)