22:57 Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model IACR
15:33 Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods IACR
20:11 Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea IACR
20:15 Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration IACR
16:13 Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation IACR