IACR Transactions on Cryptographic Hardware and Embedded Systems
Home Journals Details

IACR Transactions on Cryptographic Hardware and Embedded Systems

0.0 (0 ratings)
Cryptography
38 views

Explore IACR Transactions on Cryptographic Hardware and Embedded Systems. Cutting-edge research on secure computing, implementation, attacks, and countermeasures in hardware.

IACR Transactions on Cryptographic Hardware and Embedded Systems Cover

Articles in this Journal

On the Security of Lightweight Homomorphic Obfuscation for Protecting Against Hardware Trojans

Hardware Trojan (HT) attacks pose a critical threat to modern microelectronics by enabling the leakage of sensitive information, such as cryptographic keys, or by inducing functional faults. This risk is amplified in Commercial-Off-the-She...

View Full Research
DRR-NTT: Efficient NTT Accelerator in Lattice-Based Cryptography By Dimensionality Reduction in RRAM

Lattice-based cryptographic (LBC) algorithms, including Post-Quantum Cryptography (PQC) schemes and Fully Homomorphic Encryption (FHE), represent one of the most important families of quantum-resistant cryptosystems. A key computational pr...

View Full Research
DPA-Style Attacks on HQC

HQC (Hamming Quasi-Cyclic) was selected as the fifth algorithm in the NIST suite of post-quantum cryptographic (PQC) standards. As the only code-based algorithm currently standardized by NIST, HQC offers a good balance between security ass...

View Full Research
Secret Key Recovery of FALCON using Simple Power Analysis in Conditional Calculator

Among the NIST-standardized algorithms, FALCON is a lattice-based digital signature scheme that offers strong security and compactness. However, FALCON’s reliance on floating-point arithmetic makes it vulnerable to side-channel attacks. In...

View Full Research

Showing 16 to 19 of 19 results