-
1
Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis
Published 2019-02-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
2
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
Published 2022-11-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
3
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures
Published 2024-07-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
4
Faster Complete Addition Laws for Montgomery Curves
Published 2024-09-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
5
Classic McEliece on the ARM Cortex-M4
Published 2021-07-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
6
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
Published 2023-03-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
7
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4
Published 2022-08-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
8
Improving CEMA using Correlation Optimization
Published 2018-11-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
9
High-order masking of NTRU
Published 2023-03-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
10
Leading Degree: A Metric for Model Performance Evaluation and Hyperparameter Tuning in Deep Learning-Based Side-Channel Analysis
Published 2025-03-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
11
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks
Published 2023-03-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
12
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4
Published 2022-08-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
13
Persistent Fault Attack in Practice
Published 2020-03-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
14
Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs
Published 2023-06-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
15
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning
Published 2020-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
16
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
Published 2024-03-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
17
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips
Published 2024-03-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
18
M&M: Masks and Macs against Physical Attacks
Published 2018-11-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
19
High-Performance Design Patterns and File Formats for Side-Channel Analysis
Published 2024-03-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
20
Best Information is Most Successful
Published 2019-02-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article