| A survey of microarchitectural timing attacks and countermeasures on contemporary hardware |
19 |
| A review of lightweight block ciphers |
13 |
| Triathlon of lightweight block ciphers for the Internet of things |
9 |
| Montgomery curves and their arithmetic: The case of large characteristic fields |
4 |
| Compact circuits for combined AES encryption/decryption |
3 |
| Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs |
3 |
| RNS Montgomery reduction algorithms using quadratic residuosity |
3 |
| Uniform Montgomery multiplier |
3 |
| Montgomery reduction within the context of residue number system arithmetic |
3 |
| Side-channel robustness analysis of masked assembly codes using a symbolic approach |
2 |
| Arithmetic coding and blinding countermeasures for lattice signatures Engineering a side-channel resistant post-quantum signature scheme with compact signatures |
2 |
| Online template attacks |
2 |
| A unified masking approach |
1 |
| A class of safe and efficient binary Edwards curves |
1 |
| Scan-based side channel attack on stream ciphers and its prevention |
1 |
| Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version |
1 |
| A trivial debiasing scheme for Helper Data Systems |
1 |
| From theory to practice: horizontal attacks on protected implementations of modular exponentiations |
1 |
| Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology |
1 |
| Internal differential fault analysis of parallelizable ciphers in the counter-mode |
1 |
| Highly efficient GF(2(8)) inversion circuit based on hybrid GF representations |
1 |
| Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs |
1 |
| Montgomery inversion |
1 |
| Karatsuba-like formulae and their associated techniques |
1 |
| TriviA and uTriviA: two fast and secure authenticated encryption schemes |
1 |
| Disk encryption: do we need to preserve length? |
1 |
| Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs |
1 |
| Polynomial direct sum masking to protect against both SCA and FIA |
0 |
| Regulating the pace of von Neumann correctors |
0 |
| Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands |
0 |
| Mixed-radix Naccache-Stern encryption |
0 |
| On the verification of system-level information flow properties for virtualized execution platforms |
0 |
| An automated framework for exploitable fault identification in block ciphers |
0 |
| Physical model of sensitive data leakage from PC-based cryptographic systems |
0 |
| A new class of irreducible pentanomials for polynomial-based multipliers in binary fields |
0 |
| Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search |
0 |
| A toolbox for software optimization of QC-MDPC code-based cryptosystems |
0 |
| The Montgomery ladder on binary elliptic curves |
0 |
| Spectral arithmetic in Montgomery modular multiplication |
0 |
| Design and implementation of low-depth pairing-based homomorphic encryption scheme |
0 |
| Constant-time higher-order Boolean-to-arithmetic masking |
0 |
| MEAS: memory encryption and authentication secure against side-channel attacks |
0 |
| Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding |
0 |
| Constructing multidimensional differential addition chains and their applications |
0 |
| Euclidean addition chains scalar multiplication on curves with efficient endomorphism |
0 |
| Another dimension in integrated circuit trust |
0 |
| Arithmetic of tau-adic expansions for lightweight Koblitz curve cryptography |
0 |
| Your rails cannot hide from localized EM: how dual-rail logic fails on FPGAs-extended version |
0 |
| McBits revisited: toward a fast constant-time code-based KEM |
0 |