Accelerating the Best Trail Search on AES-Like Ciphers | 0 | 0.34 | 2022 |
Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing | 0 | 0.34 | 2022 |
Toffoli gate count Optimized Space-Efficient Quantum Circuit for Binary Field Multiplication. | 0 | 0.34 | 2022 |
Integral Cryptanalysis of Lightweight Block Cipher PIPO. | 0 | 0.34 | 2022 |
Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting | 0 | 0.34 | 2022 |
A Preimage Attack on Reduced Gimli-Hash | 0 | 0.34 | 2021 |
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application | 0 | 0.34 | 2021 |
Efficient implementation of modular multiplication over 192-bit NIST prime for 8-bit AVR-based sensor node | 0 | 0.34 | 2021 |
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries. | 1 | 0.35 | 2021 |
A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure | 0 | 0.34 | 2020 |
PIPO - A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. | 0 | 0.34 | 2020 |
New Approach To Constructing Noise Source Based On Race Conditions | 0 | 0.34 | 2019 |
An efficient implementation of pairing-based cryptography on MSP430 processor. | 0 | 0.34 | 2018 |
New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves | 0 | 0.34 | 2018 |
Low complexity bit-parallel multiplier for F2n defined by repeated polynomials. | 0 | 0.34 | 2018 |
RCB: leakage-resilient authenticated encryption via re-keying. | 1 | 0.37 | 2018 |
Efficient Isogeny Computations on Twisted Edwards Curves. | 1 | 0.36 | 2018 |
Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor. | 0 | 0.34 | 2018 |
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers. | 0 | 0.34 | 2017 |
STBC: Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay | 1 | 0.34 | 2017 |
Known-Key Attack On Sm4 Block Cipher | 0 | 0.34 | 2017 |
Faster elliptic curve arithmetic for triple-base chain by reordering sequences of field operations. | 0 | 0.34 | 2016 |
New Impossible Differential Characteristic of SPECK64 using MILP. | 0 | 0.34 | 2016 |
New Efficient Padding Methods Secure Against Padding Oracle Attacks. | 0 | 0.34 | 2015 |
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks | 1 | 0.37 | 2015 |
Accelerating elliptic curve scalar multiplication over GF(2m) on graphic hardwares. | 4 | 0.44 | 2015 |
Practical Rsa-Pake For Low-Power Device In Imbalanced Wireless Networks | 0 | 0.34 | 2014 |
Message blinding method requiring no multiplicative inversion for RSA | 0 | 0.34 | 2014 |
Related-Key Cryptanalysis On The Full Printcipher Suitable For Ic-Printing | 3 | 0.44 | 2014 |
Formulas for cube roots in F3m using shifted polynomial basis | 0 | 0.34 | 2014 |
Security Analysis Of Scalable Block Cipher Pp-1 Applicable To Distributed Sensor Networks | 0 | 0.34 | 2013 |
Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis | 2 | 0.41 | 2013 |
Fiat-shamir identification scheme immune to the hardware fault attacks | 1 | 0.35 | 2013 |
Improved Differential Fault Analysis on ARIA using Small Number of Faults. | 0 | 0.34 | 2013 |
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. | 5 | 0.47 | 2013 |
Improved Differential Fault Analysis on Block Cipher SEED-128 | 0 | 0.34 | 2012 |
New bit parallel multiplier with low space complexity for all irreducible trinomials over GF(2n) | 6 | 0.45 | 2012 |
Known-Key Attacks On Generalized Feistel Schemes With Sp Round Function | 2 | 0.40 | 2012 |
Differential fault analysis on block cipher SEED | 14 | 0.79 | 2012 |
Meet-In-The-Middle Preimage Attacks On Hash Modes Of Generalized Feistel And Misty Schemes With Sp Round Function | 2 | 0.37 | 2012 |
Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system | 0 | 0.34 | 2012 |
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED. | 7 | 0.53 | 2012 |
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis | 3 | 0.48 | 2012 |
A fast and provably secure higher-order masking of AES S-box | 40 | 1.37 | 2011 |
An Efficient Implementation of KCDSA on Graphic Processing Units | 1 | 0.37 | 2011 |
Fault Injection Attack on A5/3 | 1 | 0.36 | 2011 |
An efficient CRT-RSA algorithm secure against power and fault attacks | 3 | 0.41 | 2011 |
First-order side channel attacks on Zhang's countermeasures. | 1 | 0.35 | 2011 |
Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers | 23 | 1.36 | 2010 |
Acceleration Of Differential Power Analysis Through The Parallel Use Of Gpu And Cpu | 3 | 0.45 | 2010 |