This paper presents a method for hardware trojan detection in integrated...
We present the first BLS12-381 elliptic curve pairing crypto-processor f...
With the recent advancements in machine learning theory, many commercial...
We identify three common cases that lead to overestimation of adversaria...
This paper presents a dual-factor authentication protocol and its low-po...
Public key cryptography protocols, such as RSA and elliptic curve
crypto...
This paper presents the first hardware implementation of the Datagram
Tr...
This paper presents a configurable lattice cryptography processor which
...
This paper presents a reconfigurable cryptographic engine that implement...