A relation calculus for reasoning about t-probing security Maria Chiara MolteniVittorio Zaccaria Regular Paper Open access 26 February 2022 Pages: 1 - 14
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications Dušan BožilovMiroslav KneževićVentzislav Nikov Regular Paper 25 November 2021 Pages: 15 - 51
Melting SNOW-V: improved lightweight architectures Andrea CaforioFatih BalliSubhadeep Banik Regular Paper Open access 04 December 2020 Pages: 53 - 73
Spectral approach to process the (multivariate) high-order template attack against any masking scheme Maamar OuladjSylvain GuilleyFarid Mokrane Regular Paper 07 January 2021 Pages: 75 - 93
Parallel modular multiplication using 512-bit advanced vector instructions Benjamin BuhrowBarry GilbertClifton Haider Regular Paper Open access 13 February 2021 Pages: 95 - 105
Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels Kaushik NathPalash Sarkar Regular Paper 12 April 2021 Pages: 107 - 121