.-Attacks on Symmetric Cryptography.
.- The Dangerous Message/Key Swap in HMAC.
.- Practical Second-Order CPA Attack on Ascon with Proper Selection
Function.
.- Side-Channel Attacks.
.- On the Success Rate of Simple Side-Channel Attacks against Masking
with Unlimited Attack Traces.
.- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.
.- Physical Security.
.- Robust and Reliable PUF Protocol Exploiting Non-Monotonic
Quantization and Neyman-Pearson Lemma.
.- Towards Package Opening Detection at Power-up by Monitoring
Thermal Dissipation.
.- Partial Key Overwrite Attacks in Microcontrollers: a Survey.
.- RISC-V.
.- Combined Masking and Shuffling for Side-Channel Secure Ascon on
RISC-V.
.- A Hardware Design Methodology to Prevent Microarchitectural
Transition Leakages.
.-
Machine Learning.
.- Taking AI-Based Side-Channel Attacks to a New Dimension.
.- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for
Deep Learning-based Side-Channel Analysis.
.- Improving Leakage Exploitability in Horizontal Side Channel Attacks
through Anomaly Mitigation with Unsupervised Neural Networks.
.- Profiling Side-Channel Attack on HQC Polynomial Multiplication
Using Machine Learning Methods.
.- Attacks on Post-Quantum Cryptography.
.- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.
.- A Horizontal Attack on the Codes and Restricted Objects Signature
Scheme (CROSS).
.- Vladimir Sarde and Nicolas Debande.
.- Message-Recovery Horizontal Correlation Attack on Classic McEliece.
.- Breaking HuFu with 0 Leakage: A Side-Channel Analysis.
.- Securing Post-Quantum Cryptography.
.- X2X: Low-Randomness and High-Throughput A2B and B2A
conversions for d+1 shares in Hardware.
.- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum
Digital Signatures and KEMs.
.- Efficient Error Detection Methods for the Number Theoretic Transforms
in Lattice-Based Algorithms.
.- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.
.- Homomorphic Encryption and White-Box Cryptography.
.- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.
.- White-Box Implementation Techniques for the HFE Family.