Cited By
View all- Ravi PChattopadhyay AD’Anvers JBaksi A(2024)Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New ResultsACM Transactions on Embedded Computing Systems10.1145/360317023:2(1-54)Online publication date: 28-Mar-2024
- Almeida JArranz Olmos SBarbosa MBarthe GDupressoir FGrégoire BLaporte VLéchenet JLow COliveira TPacheco HQuaresma MSchwabe PStrub P(2024)Formally Verifying KyberAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_12(384-421)Online publication date: 18-Aug-2024
- Mondal PKundu SBhattacharya SKarmakar AVerbauwhede I(2024)A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using RowhammerApplied Cryptography and Network Security10.1007/978-3-031-54776-8_11(271-300)Online publication date: 5-Mar-2024
- Show More Cited By