Volgen
Georg Land
Georg Land
Geverifieerd e-mailadres voor ruhr-uni-bochum.de - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A hard crystal-implementing dilithium on reconfigurable hardware
G Land, P Sasdrich, T Güneysu
International Conference on Smart Card Research and Advanced Applications …, 2021
472021
First-order masked Kyber on ARM Cortex-M4
D Heinz, MJ Kannwischer, G Land, T Pöppelmann, P Schwabe, ...
Cryptology ePrint Archive, 2022
432022
Finding and evaluating parameters for BGV
J Mono, C Marcolla, G Land, T Güneysu, N Aaraj
International Conference on Cryptology in Africa, 370-394, 2023
152023
Efficiently masking polynomial inversion at arbitrary order
M Krausz, G Land, J Richter-Brockmann, T Güneysu
International Conference on Post-Quantum Cryptography, 309-326, 2022
112022
Breaking and protecting the crystal: Side-channel analysis of dilithium in hardware
H Steffen, G Land, L Kogelheide, T Güneysu
International Conference on Post-Quantum Cryptography, 688-711, 2023
82023
A holistic approach towards side-channel secure fixed-weight polynomial sampling
M Krausz, G Land, J Richter-Brockmann, T Güneysu
IACR International Conference on Public-Key Cryptography, 94-124, 2023
72023
HAETAE: shorter lattice-based Fiat-Shamir signatures
JH Cheon, H Choe, J Devevey, T Güneysu, D Hong, M Krausz, G Land, ...
Cryptology ePrint Archive, 2023
72023
Proof-of-possession for KEM certificates using verifiable generation
T Güneysu, P Hodges, G Land, M Ounsworth, D Stebila, G Zaverucha
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
42022
Correction Fault Attacks on Randomized CRYSTALS-Dilithium
E Krahmer, P Pessl, G Land, T Güneysu
Cryptology ePrint Archive, 2024
22024
Generic Accelerators for Costly-to-Mask PQC Components
M Krausz, G Land, F Stolz, D Naujoks, J Richter-Brockmann, T Güneysu, ...
Cryptology ePrint Archive, 2023
12023
HAETAE: Hyperball bimodAl modulE rejecTion signAture schemE
JH Cheon, H Choe, J Devevey, T Güneysu, D Hong, M Krausz, G Land, ...
Tech. Rep, 2023
12023
Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware
G Land, A Marotzke, J Richter-Brockmann, T Güneysu
Cryptology ePrint Archive, 2023
12023
HADES: Automated Hardware Design Exploration for Cryptographic Primitives
F Buschkowski, G Land, J Richter-Brockmann, P Sasdrich, T Güneysu
Cryptology ePrint Archive, 2024
2024
Practical Post-Quantum Signatures for Privacy
S Argo, T Güneysu, C Jeudy, G Land, A Roux-Langlois, O Sanders
Cryptology ePrint Archive, 2024
2024
Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware
G Land, A Marotzke, J Richter-Brockmann, T Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (1), 1-26, 2024
2024
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps
A Guinet, G Land, IG Bucur, T Güneysu
2023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–16