Author:
Genêt Aymeric,de Guertechin Natacha Linard,Kaluđerović Novak
Publisher
Springer International Publishing
Reference51 articles.
1. Apon, D.: Passing the final checkpoint! NIST PQC 3rd round begins (2020). https://meetings.ams.org/math/fall2020se/meetingapp.cgi/Paper/1656. https://www.scribd.com/document/474476570/PQC-Overview-Aug-2020-NIST
2. Aysu, A., Tobah, Y., Tiwari, M., Gerstlauer, A., Orshansky, M.: Horizontal side-channel vulnerabilities of post-quantum key exchange protocols. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 81–88 (2018). https://doi.org/10.1109/HST.2018.8383894
3. Azarderakhsh, R., Jao, D., Kalach, K., Koziel, B., Leonardi, C.: Key compression for isogeny-based cryptosystems. Cryptology ePrint Archive, Report 2016/229 (2016). https://eprint.iacr.org/2016/229
4. Lecture Notes in Computer Science;M Azouaoui,2019
5. Batina, L., Chmielewski, L., Papachristodoulou, L., Schwabe, P., Tunstall, M.: Online template attacks. J. Cryptogr. Eng. 9(1), 21–36 (2017). https://doi.org/10.1007/s13389-017-0171-8
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献