Comment
Author: Admin | 2025-04-28
Sharings on two secrets: Buy one, get one freePaula Arnold, Sebastian Berndt, Thomas Eisenbarth, Maximilian OrltUniversity of Lübeck; Technische Hochschule Lübeck; TU DarmstadtUnboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its ApplicationsYufeng Tang, Zheng Gong, Liangju Zhao, Di Li, Zhe LiuSouth China Normal University; Zhejiang Lab TCHES 2024, issue 4 SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic CircuitsHuiyu Tan, Pengfei Gao, Taolue Chen, Fu Song, Zhilin WuShanghaiTech University; Bytedance; Birkbeck, University of London; Chinese Academy of SciencesSPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement LearningZiyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, Liehuang ZhuBeijing Institute of TechnologyEnabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained DevicesAlessandro Budroni, Loïc Bidoux, Lucas Pandolfo Perin, Marco Palumbi, slim bettaiebTechnology Innovation InstituteClosing the Gap: Leakage Contracts for Processors with Transitions and GlitchesJohannes Haring, Vedad Hadžić, Roderick BloemGraz University of TechnologyAnother Evidence to not Employ Customized Masked Hardware - Identifying and Fixing Flaws in SCARVFelix Uhle, Florian Stolz, Amir MoradiRuhr Universität Bochum; TU DarmstadtA Not So Discrete Sampler: Power Analysis Attacks on HAWK signature schemeMorgane Guerreau, Mélissa RossiCryptoNext Security; ANSSIFault-Resistant Partitioning of Secure CPUs for System Co-Verification against FaultsSimon Tollec, Vedad Hadžić, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan MangardUniversité Paris-Saclay; Graz University of Technology; lowRISC C.I.C.; Université Grenoble Alpes; Thales DIS; Sorbonne UniversitéFast Transciphering via Batched and Reconfigurable LUT EvaluationLeonard Schild, Aysajan Abidin, Bart PreneelKU LeuvenBreaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3Cankun Zhao, Hang Zhao, Jiangxue Liu, Bohan Yang, Wenping Zhu, Shuying Yin, Min Zhu, Shaojun Wei, Leibo LiuTsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co., Ltd.Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUsXudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui HouChinese Academy of Sciences;
Add Comment