Loading…
Loading…
Loading…
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
Jung, Wonkyung, Kim, Sangpyo, Ahn, Jung Ho, Cheon, Jung Hee, Lee, Younho
Published in IACR transactions on cryptographic hardware and embedded systems (11.08.2021)
Published in IACR transactions on cryptographic hardware and embedded systems (11.08.2021)
Get full text
Journal Article
Loading…
Loading…
Make Some Noise Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Kim, Jaehun, Picek, Stjepan, Heuser, Annelie, Bhasin, Shivam, Hanjalic, Alan
Published in IACR transactions on cryptographic hardware and embedded systems (09.05.2019)
Published in IACR transactions on cryptographic hardware and embedded systems (09.05.2019)
Get full text
Journal Article
Loading…
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Picek, Stjepan, Heuser, Annelie, Jovic, Alan, Bhasin, Shivam, Regazzoni, Francesco
Published in IACR transactions on cryptographic hardware and embedded systems (01.08.2019)
Published in IACR transactions on cryptographic hardware and embedded systems (01.08.2019)
Get full text
Journal Article
Loading…
Loading…
NTT Multiplication for NTT-unfriendly Rings: New Speed Records for Saber and NTRU on Cortex-M4 and AVX2
Chung, Chi-Ming Marvin, Hwang, Vincent, Kannwischer, Matthias J., Seiler, Gregor, Shih, Cheng-Jhih, Yang, Bo-Yin
Published in IACR transactions on cryptographic hardware and embedded systems (23.02.2021)
Published in IACR transactions on cryptographic hardware and embedded systems (23.02.2021)
Get full text
Journal Article
Loading…
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk
Published in IACR transactions on cryptographic hardware and embedded systems (01.08.2019)
Published in IACR transactions on cryptographic hardware and embedded systems (01.08.2019)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Masking Kyber: First- and Higher-Order Implementations
Bos, Joppe W., Gourjon, Marc, Renes, Joost, Schneider, Tobias, Van Vredendaal, Christine
Published in IACR transactions on cryptographic hardware and embedded systems (11.08.2021)
Published in IACR transactions on cryptographic hardware and embedded systems (11.08.2021)
Get full text
Journal Article
Loading…
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
Published in IACR transactions on cryptographic hardware and embedded systems (01.06.2020)
Published in IACR transactions on cryptographic hardware and embedded systems (01.06.2020)
Get full text
Journal Article
Loading…
Fast constant-time gcd computation and modular inversion
Daniel J. Bernstein, Bo-Yin Yang
Published in IACR transactions on cryptographic hardware and embedded systems (01.05.2019)
Published in IACR transactions on cryptographic hardware and embedded systems (01.05.2019)
Get full text
Journal Article
Loading…
Loading…
Persistent Fault Analysis on Block Ciphers
Fan Zhang, Xiaoxuan Lou, Xinjie Zhao, Shivam Bhasin, Wei He, Ruyi Ding, Samiya Qureshi, Kui Ren
Published in IACR transactions on cryptographic hardware and embedded systems (01.08.2018)
Published in IACR transactions on cryptographic hardware and embedded systems (01.08.2018)
Get full text
Journal Article
Loading…
Loading…