Title | Authors |
---|---|
A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer |
|
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks |
|
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation |
|
Algorithmic Views of Vectorized Polynomial Multipliers – NTRU Prime |
|
An In-depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation |
|
Building MPCitH-based Signatures from MQ, MinRank, and Rank SD |
|
CryptoZoo: A Viewer for Cryptographic Reduction Proofs |
|
Decentralized Private Stream Aggregation from Lattices |
|
Efficient Clustering on Encrypted Data |
|
Exploring SIDH-based Signature Parameters |
|
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search |
|
Identity-Based Matchmaking Encryption from Standard Lattice Assumptions |
|
Powers-of-Tau to the People: Decentralizing Setup Ceremonies |
|
Practical Lattice-Based Distributed Signatures for a Small Number of Signers |
|
Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48 |
|
Self-Sovereign Identity for Electric Vehicle Charging |
|
Subversion-Resilient Signatures without Random Oracles |
|
The Key Lattice Framework for Concurrent Group Messaging |
|
Time Is Money, Friend! Timing Side-channel Attack against Garbled Circuit Constructions |
|
When and How to Aggregate Message Authentication Codes on Lossy Channels? |
|