Linked e-resources
Details
Table of Contents
Fault-Injection Analyses and Countermeasures
SAMVA: Static Analysis for Multi-Fault Attack Paths Determination
Efficient attack-surface exploration for electromagnetic fault injection
A CCFI verification scheme based on the RISC-V Trace Encoder
Side-Channel Analyses and Countermeasures
ASCA vs. SASCA - A closer look at the AES key schedule
Removing the Field Size Loss from Duc et al.s Conjectured Bound for Masked Encodings
Improving Side-channel Leakage Assessment using Pre-silicon Leakage Models
Attacks on PQC and Countermeasures
Fast First-Order Masked NTTRU
On the Feasibility of Single-Trace Attacks on the CDT Gaussian Sampler in FrodoKEM
Punctured Syndrome Decoding Problem: Efficient Side-Channel Attacks Against Classic McEliece
Analyses and Tools
Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study
Whiteboxgrind - Automated Analysis of Whitebox Cryptography
White-box cryptography with global device binding from message recoverable signatures and token-based obfuscation.
SAMVA: Static Analysis for Multi-Fault Attack Paths Determination
Efficient attack-surface exploration for electromagnetic fault injection
A CCFI verification scheme based on the RISC-V Trace Encoder
Side-Channel Analyses and Countermeasures
ASCA vs. SASCA - A closer look at the AES key schedule
Removing the Field Size Loss from Duc et al.s Conjectured Bound for Masked Encodings
Improving Side-channel Leakage Assessment using Pre-silicon Leakage Models
Attacks on PQC and Countermeasures
Fast First-Order Masked NTTRU
On the Feasibility of Single-Trace Attacks on the CDT Gaussian Sampler in FrodoKEM
Punctured Syndrome Decoding Problem: Efficient Side-Channel Attacks Against Classic McEliece
Analyses and Tools
Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study
Whiteboxgrind - Automated Analysis of Whitebox Cryptography
White-box cryptography with global device binding from message recoverable signatures and token-based obfuscation.