20:24 Fixslicing: A New GIFT Representation: Fast Constant-Time Implementations of GIFT and GIFT-COFB... IACR
22:41 SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Bl... IACR
24:31 Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of b... IACR
22:50 Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations IACR
24:56 CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design IACR
22:35 A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Applic... IACR
25:20 Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled... IACR
20:11 Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis?... IACR
23:02 Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the... IACR
20:15 Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based crypt... IACR
18:54 High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in ... IACR
21:17 FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block... IACR