共 73 条
[1]
Melchor Carlos Aguilar, Aragon Nicolas, Bettaieb Slim, Bidoux Loic, Blazy Olivier, Deneuville Jean-Christophe, Gaborit Philippe, Persichetti Edoardo, Zemor Gilles, Bos Jurjen, (2020)
[2]
Aragon Nicolas, Barreto Paulo, Bettaieb Slim, Bidoux Loic, Blazy Olivier, Deneuville Jean-Christophe, Gaborit Phillipe, Gueron Shay, Guneysu Tim, Melchor Carlos Aguilar, Misoczki Rafael, Persichetti Edoardo, Sendrier Nicolas, Tillich Jean-Pierre, Zemor Gilles, Vasseur Valentin, Ghosh Santosh, BIKE. Technical report, National Institute of Standards and Technology, (2020)
[3]
Albrecht Martin R., Bernstein Daniel J., Chou Tung, Cid Carlos, Gilcher Jan, Lange Tanja, Maram Varun, von Maurich Ingo, Misoczki Rafael, Nieder-hagen Ruben, Paterson Kenneth G., Persichetti Edoardo, Peters Christiane, Schwabe Peter, Sendrier Nicolas, Szefer Jakub, Tjhai Cen Jung, Tomlinson Martin, Wang Wen, Classic McEliece, (2020)
[4]
Azouaoui Melissa, Bronchain Olivier, Hoffmann Clement, Kuzovkova Yulia, Schneider Tobias, Standaert Francois-Xavier, Systematic study of decryption and re-encryption leakage: the case of kyber, Cryptology ePrint Archive, (2022)
[5]
Avanzi Roberto, Hoerder Simon, Page Dan, Tunstall Michael, Side-channel attacks on the McEliece and niederreiter public-key cryptosystems, Journal of Cryptographic Engineering, 1, 4, pp. 271-281, (2011)
[6]
Askeland Amund, Ronjom Sondre, A side-channel assisted attack on NTRU, (2021)
[7]
Bernstein Daniel J., Chou Tung, Schwabe Peter, McBits: Fast constant-time code-based cryptography, Cryptographic Hardware and Embedded Systems – CHES 2013, volume 8086 of Lecture Notes in Computer Science, pp. 250-272, (2013)
[8]
Bhasin Shivam, D'Anvers Jan-Pieter, Heinz Daniel, Poppelmann Thomas, Van Beirendonck Michiel, Attacking and defending masked polynomial comparison, IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 3, pp. 334-359, (2021)
[9]
Van Beirendonck Michiel, D'Anvers Jan-Pieter, Karmakar Angshuman, Balasch Josep, Verbauwhede Ingrid, A side-channel resistant implementation of SABER, Cryptology ePrint Archive, (2020)
[10]
Balasch Josep, Gierlichs Benedikt, Grosso Vincent, Reparaz Oscar, Standaert Francois-Xavier, On the cost of lazy engineering for masked software implementations, Smart Card Research and Advanced Applications, pp. 64-81, (2015)