The following pages link to A masked ring-LWE implementation (Q1695914):
Displaying 12 items.
- Secure number theoretic transform and speed record for Ring-LWE encryption on embedded processors (Q1642452) (← links)
- Masking the GLP lattice-based signature scheme at any order (Q1648842) (← links)
- Efficient ring-LWE encryption on 8-bit AVR processors (Q1695913) (← links)
- Assessing the feasibility of single trace power analysis of Frodo (Q1726676) (← links)
- Tightly secure ring-LWE based key encapsulation with short ciphertexts (Q2167708) (← links)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not (Q2958149) (← links)
- Detecting Flawed Masking Schemes with Leakage Detection Tests (Q4639478) (← links)
- One-hot conversion: towards faster table-based A2B conversion (Q6061537) (← links)
- Higher-order masked Saber (Q6134812) (← links)
- Fault-enabled chosen-ciphertext attacks on Kyber (Q6157594) (← links)
- Efficiently masking polynomial inversion at arbitrary order (Q6166989) (← links)
- Masking the GLP lattice-based signature scheme at any order (Q6182002) (← links)