Search

Your search keyword '"CryptoExperts"' showing total 42 results

Search Constraints

Start Over You searched for: Author "CryptoExperts" Remove constraint Author: "CryptoExperts"
42 results on '"CryptoExperts"'

Search Results

1. Univariate side channel attacks and leakage modeling

2. How to Compress Homomorphic Ciphertexts

3. Scale-Invariant Fully-Homomorphic Encryption over the Integers

4. Lattice signatures and bimodal Gaussians

5. White-Box Security Notions for Symmetric Encryption Schemes

6. Batch Fully Homomorphic Encryption over the Integers

7. On the Minimal Number of Bootstrappings in Homomorphic Circuits

8. Generating Provable Primes Efficiently on Embedded Devices

9. Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection

10. Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity

11. Speeding-Up Verification of Digital Signatures

12. Probing Security through Input-Output Separation and Revisited Quasilinear Masking

13. On the Power of Expansion: More Efficient Constructions in the Random Probing Model

14. Random Probing Security: Verification, Composition, Expansion and New Constructions

15. Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations

16. MaskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults

17. Automated Verification of Higher-Order Masking in Presence of Physical Defaults

18. How to Reveal the Secrets of an Obscure White-Box Implementation

19. GALACTICS - Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited

20. Technical history of discrete logarithms in small characteristic finite fields: The road from subexponential to quasi-polynomial complexity

21. How to Securely Compute with Noisy Leakage in Quasilinear Complexity

22. Implémentations sécurisées de chiffrement par bloc contre les attaques physiques

23. Masking the GLP Lattice-Based Signature Scheme at Any Order

24. Secure Implementation of Block Ciphers against Physical Attacks

25. Fast Homomorphic Evaluation of Deep Discretized Neural Networks

26. Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures

27. How Fast Can Higher-Order Masking Be in Software?

28. Processing Encrypted Data Using Homomorphic Encryption

29. Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication

30. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

31. NFLlib: NTT-based Fast Lattice Library

32. On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking

33. Univariate side channel attacks and leakage modeling

34. Cover and Decomposition Index Calculus on Elliptic Curves made practical: Application to a previously unreachable curve over Fp6

35. How to Estimate the Success Rate of Higher Order Side-Channels Attacks

36. Conception and implémentation de cryptographie à base de réseaux

37. A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic

38. Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes

39. Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions

40. Two Attacks on a White-Box AES Implementation

41. Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations

42. Alzette: A 64-Bit ARX-box: (feat. CRAX and TRAX)

Catalog

Books, media, physical & digital resources