Similar Items: Best interleave size of GIFT-128 on 64-bit ARM processor
- A fresh look on asymmetric crypto: accelerating WolfSSL on end-nodes processors
- Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA
- A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber
- Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna
- Evaluation of encrypted matching criteria using homomorphic encryption based FSM
- NEED OF PARADIGM SHIFT IN CYBERSECURITY IMPLEMENTATION FOR SMALL AND MEDIUM ENTERPRISES (SMES)