Works matching IS 18622976 AND DT 2020 AND VI 14 AND IP 1


Results: 12
    1
    2
    3
    4

    Recovering Secrets From Prefix-Dependent Leakage.

    Published in:
    Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 15, doi. 10.1515/jmc-2015-0048
    By:
    • Ferradi, Houda;
    • Géraud, Rémi;
    • Guilley, Sylvain;
    • Naccache, David;
    • Tibouchi, Mehdi
    Publication type:
    Article
    5
    6
    7

    New Techniques for SIDH-based NIKE.

    Published in:
    Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 120, doi. 10.1515/jmc-2015-0056
    By:
    • Urbanik, David;
    • Jao, David
    Publication type:
    Article
    8

    Characterizing overstretched NTRU attacks.

    Published in:
    Journal of Mathematical Cryptology, 2020, v. 14, n. 1, p. 110, doi. 10.1515/jmc-2015-0055
    By:
    • De Micheli, Gabrielle;
    • Heninger, Nadia;
    • Shani, Barak
    Publication type:
    Article
    9
    10
    11
    12