Explore IACR Transactions on Cryptographic Hardware and Embedded Systems. Cutting-edge research on secure computing, implementation, attacks, and countermeasures in hardware.
Hardware Trojan (HT) attacks pose a critical threat to modern microelectronics by enabling the leakage of sensitive information, such as cryptographic keys, or by inducing functional faults. This risk is amplified in Commercial-Off-the-She...
Lattice-based cryptographic (LBC) algorithms, including Post-Quantum Cryptography (PQC) schemes and Fully Homomorphic Encryption (FHE), represent one of the most important families of quantum-resistant cryptosystems. A key computational pr...
HQC (Hamming Quasi-Cyclic) was selected as the fifth algorithm in the NIST suite of post-quantum cryptographic (PQC) standards. As the only code-based algorithm currently standardized by NIST, HQC offers a good balance between security ass...
Among the NIST-standardized algorithms, FALCON is a lattice-based digital signature scheme that offers strong security and compactness. However, FALCON’s reliance on floating-point arithmetic makes it vulnerable to side-channel attacks. In...
Showing 16 to 19 of 19 results
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria