Works matching IS 18622976 AND DT 2020 AND VI 14 AND IP 1


Results: 12
    1
    2
    3

    New Techniques for SIDH-based NIKE.

    Published in:
    Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 120, doi. 10.1515/jmc-2015-0056
    By:
    • Urbanik, David;
    • Jao, David
    Publication type:
    Article
    4

    Characterizing overstretched NTRU attacks.

    Published in:
    Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 110, doi. 10.1515/jmc-2015-0055
    By:
    • De Micheli, Gabrielle;
    • Heninger, Nadia;
    • Shani, Barak
    Publication type:
    Article
    5
    6
    7
    8
    9
    10
    11

    Recovering Secrets From Prefix-Dependent Leakage.

    Published in:
    Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 15, doi. 10.1515/jmc-2015-0048
    By:
    • Ferradi, Houda;
    • Géraud, Rémi;
    • Guilley, Sylvain;
    • Naccache, David;
    • Tibouchi, Mehdi
    Publication type:
    Article
    12