Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Page
Title
1-22
3D Hardware Canaries
23-40
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
41-57
Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us
58-75
Compiler Assisted Masking
76-91
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
92-106
How Far Should Theory Be from Practice? - Evaluation of a Countermeasure
107-121
Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
122-139
A Differential Fault Attack on the Grain Family of Stream Ciphers
140-154
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
155-174
Selecting Time Samples for Multivariate DPA Attacks
175-192
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
193-212
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
213-232
Practical Leakage-Resilient Symmetric Cryptography
233-250
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
251-267
Practical Security Analysis of PUF-Based Two-Player Protocols
268-282
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment
283-301
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
302-319
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
320-339
NEON Crypto
340-355
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware
356-373
Solving Quadratic Equations with XL on Parallel Architectures
374-389
Efficient Implementations of MQPKS on Constrained Devices
390-407
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
408-425
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation
426-446
Low-Latency Encryption - Is "Lightweight = Light + Wait"?
447-462
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
463-475
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA
476-493
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
494-511
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs
512-529
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
530-547
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
548-564
An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor