Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication. | 0 | 0.34 | 2022 |
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks. | 0 | 0.34 | 2022 |
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces. | 1 | 0.36 | 2022 |
Provable Secure Software Masking in the Real-World. | 0 | 0.34 | 2022 |
My other car is your car: compromising the Tesla Model X keyless entry system. | 2 | 0.64 | 2021 |
Dismantling DST80-based Immobiliser Systems. | 0 | 0.34 | 2020 |
Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks. | 0 | 0.34 | 2020 |