Verifying the security of masked hardware and software implementations, under advanced leakage models, remains a significant challenge, esp...
The paper introduces "aLEAKator," a novel open-source framework tackling the critical and complex challenge of formally verifying the security of mask...
The Generalized Birthday Problem (GBP) serves as a cornerstone for a broad spectrum of cryptanalytic research. The classical solution, Wagn...
QR-UOV is a multivariate signature scheme selected as one of the candidates in the second round of the NIST PQC Additional Digital Signatur...
The paper "AVX2 Implementation of QR-UOV for Modern x86 Processors" presents a timely and highly relevant contribution to the field of post-quantum cr...
The post-quantum signature scheme Falcon is an attractive scheme for constrained devices due to its compactness and verification performanc...
Most PQC schemes remain too resource-intensive for ultra-constrained 8-bit AVR wireless sensor nodes. In this work, we present a comprehens...
This paper tackles the critical challenge of deploying Post-Quantum Cryptography (PQC) on severely resource-constrained 8-bit AVR wireless sensor node...
This paper presents an accelerated implementation of the Hamming Quasi-Cyclic (HQC) key encapsulation mechanism by leveraging additive Fast...
We propose a new ad hoc automatic tool to look for lightweight implementations of non-linear functions on up to 7 variables. This tool is m...
This paper proposes a novel "ad hoc automatic tool" aimed at discovering lightweight implementations of non-linear functions, particularly cryptograph...
In this paper, we present an improved correlation power analysis (CPA) attack on the pre-image computation of the digital signature scheme...
This paper presents a significant advancement in correlation power analysis (CPA) attacks targeting the pre-image computation of the Falcon digital si...
Lattice-based cryptographic (LBC) algorithms, including Post-Quantum Cryptography (PQC) schemes and Fully Homomorphic Encryption (FHE), rep...
This paper introduces DRR-NTT, a novel RRAM-based compute-in-memory (CIM) accelerator designed to address the performance bottlenecks of Number Theore...
Among the NIST-standardized algorithms, FALCON is a lattice-based digital signature scheme that offers strong security and compactness. How...
This paper presents a critical analysis of the FALCON digital signature scheme, a NIST-standardized lattice-based algorithm recognized for its strong...
Showing 1 to 10 of 15 results
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria