Physical attacks form one of the most severe threats against secure comp...
Trusted Platform Modules constitute an integral building block of modern...
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes...
Combinatorial optimization - a field of research addressing problems tha...
Density modelling is the task of learning an unknown probability density...
EMFI has become a popular fault injection (FI) technique due to its abil...
The task of learning a probability distribution from samples is ubiquito...
Cryptographic algorithm agility is an important property for DNSSEC: it
...
Physical Unclonable Functions (PUFs) have been proposed as a way to iden...
There is currently a large interest in understanding the potential advan...
Both AMD and Intel have presented technologies for confidential computin...
Due to the advancing development of quantum computers, practical attacks...
Voltage fault injection (FI) is a well-known attack technique that can b...
AMD Secure Encrypted Virtualization (SEV) offers protection mechanisms f...
The threat of hardware Trojans (HTs) and their detection is a widely stu...
The security of modern electronic devices relies on secret keys stored o...
Due to its sound theoretical basis and practical efficiency, masking has...
Here we study the comparative power of classical and quantum learners fo...
Recent attacks using thermal laser stimulation (TLS) have shown that it ...
Customers of cloud services have to trust the cloud providers, as they
c...
Security of information passing through the Internet is threatened by to...
Taint-style vulnerabilities comprise a majority of fuzzer discovered pro...
With Firefox OS, Mozilla is making a serious push for an HTML5-based mob...