Publisher
Springer International Publishing
Reference44 articles.
1. Alkim, E., Bilgin, Y.A., Cenk, M., Gérard, F.: Cortex-M4 optimizations for $$\{$$R, M$$\}$$ LWE schemes. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020, 336–357 (2020)
2. Aumasson, J.P.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco (2017)
3. Avanzi, R., et al.: Kyber - public GitHub repository (2021). https://github.com/pq-crystals/kyber. Accessed 13 July 2021
4. Information Security and Cryptography;B Barak,2017
5. Barthe, G., Grégoire, B., Laporte, V.: Secure compilation of side-channel countermeasures: the case of cryptographic “constant-time”. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp. 328–343. IEEE (2018)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Runtime Verification for Trustworthy Computing;Electronic Proceedings in Theoretical Computer Science;2023-09-30