关注
Alexander Nilsson
Alexander Nilsson
PhD Researcher in Cryptography, Lund University
在 eit.lth.se 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A Survey of Published Attacks on Intel SGX
A Nilsson, PN Bideh, J Brorsson
https://arxiv.org/abs/2006.13598, 2020
1412020
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Q Guo, T Johansson, A Nilsson
Annual International Cryptology Conference, 359-386, 2020
922020
Decryption failure attacks on IND-CCA secure lattice-based schemes
JP D’Anvers, Q Guo, T Johansson, A Nilsson, F Vercauteren, ...
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
652019
Error Amplification in Code-based Cryptography
A Nilsson, T Johansson, P Wagner Stankovski
IACR Transactions on Cryptographic Hardware and Embedded Systems, 238-258, 2019
352019
Don’t reject this: Key-recovery timing attacks due to rejection-sampling in HQC and BIKE
Q Guo, C Hlauschek, T Johansson, N Lahr, A Nilsson, RL Schröder
IACR Transactions on Cryptographic Hardware and Embedded Systems, 223-263, 2022
332022
A generic attack on lattice-based schemes using decryption errors with application to ss-ntru-pke
Q Guo, T Johansson, A Nilsson
Cryptology ePrint Archive, 2019
152019
Sca-ldpc: A code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes
Q Guo, D Nabokov, A Nilsson, T Johansson
International Conference on the Theory and Application of Cryptology and …, 2023
112023
Key-hiding on the ARM platform
A Nilsson, M Andersson, S Axelsson
Digital Investigation 11, S63-S67, 2014
102014
A weighted bit flipping decoder for QC-MDPC-based cryptosystems
A Nilsson, IE Bocharova, BD Kudryashov, T Johansson
2021 IEEE International Symposium on Information Theory (ISIT), 1266-1271, 2021
92021
On the suitability of using SGX for secure key storage in the cloud
J Brorsson, PN Bideh, A Nilsson, M Hell
Trust, Privacy and Security in Digital Business: 17th International …, 2020
22020
Improving integrity assurances of log entries from the perspective of intermittently disconnected devices
M Andersson, A Nilsson
22014
系统目前无法执行此操作,请稍后再试。
文章 1–11