Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography
|
Artifact
|
Oil and Vinegar: Modern Parameters and Implementations
|
Artifact
|
Formally verifying Kyber – Episode IV: Implementation correctness
|
Artifact
|
Pasta: A Case for Hybrid Homomorphic Encryption
|
Artifact
|
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
|
Artifact
|
Separating Oil and Vinegar with a Single Trace – Side-Channel Assisted Kipnis-Shamir Attack on UOV
|
Artifact
|
Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs
|
Artifact
|
PROLEAD_SW – Probing-Based Software Leakage Detection for ARM Binaries
|
Artifact
|
Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations – Towards Analytical Attacks against 32-bit Implementations
|
Artifact
|