Showing 1 - 20 results of 25 for search '"Transactions on Cryptographic Hardware and Embedded Systems"', query time: 0.06s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Call Rewinding: Efficient Backward Edge Protection by Téo Biton, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov, Sébastien Pillement

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  5. 5

    Multiplying Polynomials without Powerful Multiplication Instructions by Vincent Hwang, YoungBeom Kim, Seog Chung Seo

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  6. 6

    Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V} by Jipeng Zhang, Yuxing Yan, Junhao Huang, Çetin Kaya Koç

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  7. 7

    Perceived Information Revisited II by Akira Ito, Rei Ueno, Naofumi Homma

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  8. 8

    OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates by Haiyue Dong, Qian Guo

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  9. 9
  10. 10

    Bit t-SNI Secure Multiplication Gadget for Inner Product Masking by John Gaspoz, Siemen Dhooghe

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  11. 11

    TPUXtract: An Exhaustive Hyperparameter Extraction Framework by Ashley Kurian, Anuj Dubey, Ferhat Yaman, Aydin Aysu

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  12. 12

    Know-Thy-Basis: Decomposing F26 for Lightweight S-box Implementation by Dilip Sau, Sumanta Sarkar, Dhiman Saha, Kalikinkar Mandal

    Published 2024-11-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  13. 13

    Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters by Vedad Hadžic, Roderick Bloem

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  14. 14
  15. 15

    Weakly Profiling Side-channel Analysis by Lichao Wu, Guilherme Perin, Stjepan Picek

    Published 2024-11-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  16. 16

    GPU Acceleration for FHEW/TFHE Bootstrapping by Yu Xiao, Feng-Hao Liu, Yu-Te Ku, Ming-Chien Ho, Chih-Fan Hsu, Ming-Ching Chang, Shih-Hao Hung, Wei-Chao Chen

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  17. 17

    Random Probing Security with Precomputation by Bohan Wang, Fanjie Ji, Yiteng Sun, Weijia Wang

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  18. 18
  19. 19

    Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training by Xunyue Hu, Quentin L. Meunier, Emmanuelle Encrenaz

    Published 2024-12-01
    “…Transactions on Cryptographic Hardware and Embedded Systems…”
    Get full text
    Article
  20. 20