Publisher
Springer Nature Switzerland
Reference25 articles.
1. Aranha, D.F., Novaes, F.R., Takahashi, A., Tibouchi, M., Yarom, Y.: Ladderleak: Breaking ECDSA with less than one bit of nonce leakage. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, New York, NY, USA, pp. 225–242. Association for Computing Machinery (2020)
2. Badertscher, C., Gazi, P., Kiayias, A., Russell, A., Zikas, V.: Ouroboros genesis: composable proof-of-stake blockchains with dynamic availability. In: Lie, D., Mannan, M., Backes, M., Wang, X.F. (eds.) ACM CCS 2018: 25th Conference on Computer and Communications Security, Toronto, ON, Canada, October 15–19, pp. 913–930. ACM Press (2018)
3. Bernstein, D.J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS$$^+$$ signature framework. In: Cavallaro, L., Kinder, J., Wang, X.F., Katz, J. (eds.), ACM CCS 2019: 26th Conference on Computer and Communications Security, 11–15 November 2019, pp. 2129–2146. ACM Press (2019)
4. Bhargavan, K., Blanchet, B., Kobeissi, N.: Verified models and reference implementations for the tls 1.3 standard candidate. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 483–502 (2017)
5. Lecture Notes in Computer Science;J Buchmann,2011