Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. | 0 | 0.34 | 2022 |
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. | 0 | 0.34 | 2022 |
The Matrix Reloaded - Multiplication Strategies in FrodoKEM. | 1 | 0.36 | 2021 |
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. | 0 | 0.34 | 2021 |
Masking Kyber: First- and Higher-Order Implementations. | 2 | 0.40 | 2021 |
A Quantum Attack on LWE with Arbitrary Error Distribution. | 1 | 0.36 | 2017 |
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. | 5 | 0.45 | 2017 |
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE. | 0 | 0.34 | 2017 |
Short generators without quantum computers: the case of multiquadratics. | 1 | 0.35 | 2017 |
NTRU Prime: Reducing Attack Surface at Low Cost. | 4 | 0.41 | 2017 |
Sliding Right Into Disaster: Left-To-Right Sliding Windows Leak | 4 | 0.41 | 2017 |
NTRU Prime. | 0 | 0.34 | 2016 |
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key. | 4 | 0.79 | 2016 |
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to. | 2 | 0.38 | 2015 |
Tighter, faster, simpler side-channel security evaluations beyond computing power. | 14 | 0.71 | 2015 |
How to manipulate curve standards: a white paper for the black hat. | 2 | 0.41 | 2014 |
Kangaroos in Side-Channel Attacks. | 7 | 0.55 | 2014 |