Linked e-resources
Details
Table of Contents
Post-Quantum Cryptography
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers
Classic McEliece Implementation with Low Memory Footprint
Efficient Implementations
A Fast and Compact RISC-V Accelerator for Ascon and Friends
Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE
Secure and E cient Delegation of Pairings with Online Inputs
Physical Attacks
On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough
A Power Side-Channel Attack on the CCA2-Secure HQC KEM
How Deep Learning Helps Compromising USIM
Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers
Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers
Classic McEliece Implementation with Low Memory Footprint
Efficient Implementations
A Fast and Compact RISC-V Accelerator for Ascon and Friends
Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE
Secure and E cient Delegation of Pairings with Online Inputs
Physical Attacks
On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough
A Power Side-Channel Attack on the CCA2-Secure HQC KEM
How Deep Learning Helps Compromising USIM
Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers
Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.