共 50 条
- [1] Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 216 - 221
- [2] Hardware Design and Implementation of Post-Quantum Cryptography Kyber 2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
- [3] Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2022 (01): : 414 - 460
- [8] Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads PROCEEDINGS OF THE 9TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2020, 2020,
- [9] Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 359 - 364
- [10] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +