Cited By
View all- Ravi PBhasin SChattopadhyay AAikata ASinha Roy S(2024)Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMsProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3660373(216-221)Online publication date: 12-Jun-2024
- Jiang HHan JZhang ZMa ZWang H(2023)Practical Algorithm Substitution Attacks on Real-World Public-Key CryptosystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.330412418(5069-5081)Online publication date: 1-Jan-2023
- Basak Chowdhury AMahapatra ASoni DKarri R(2023)Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Postquantum Signature SchemesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2022.315974942:2(384-396)Online publication date: Feb-2023
- Show More Cited By