-
1
A Framework for Generating S-Box Circuits with Boyer–Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
2
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
3
Extending Randomness-Free First-Order Masking Schemes and Applications to Masking-Friendly S-boxes
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
4
Call Rewinding: Efficient Backward Edge Protection
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
5
Multiplying Polynomials without Powerful Multiplication Instructions
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
6
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
7
Perceived Information Revisited II
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
8
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
9
FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
10
Bit t-SNI Secure Multiplication Gadget for Inner Product Masking
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
11
TPUXtract: An Exhaustive Hyperparameter Extraction Framework
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
12
Know-Thy-Basis: Decomposing F26 for Lightweight S-box Implementation
Published 2024-11-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
13
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
14
A High-performance NTT/MSM Accelerator for Zero-knowledge Proof Using Load-balanced Fully-pipelined Montgomery Multiplier
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
15
Weakly Profiling Side-channel Analysis
Published 2024-11-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
16
GPU Acceleration for FHEW/TFHE Bootstrapping
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
17
Random Probing Security with Precomputation
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
18
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
19
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article -
20
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort
Published 2024-12-01“…Transactions on Cryptographic Hardware and Embedded Systems…”
Get full text
Article