Abstract: Elliptic curve cryptography (ECC) is widely used as an efficient mechanism to secure private data using public-key protocols. We focus on ECC over five standard prime fields recommended by ...
Abstract: The Rasta cipher, proposed by Dobraunig et al. (CRYPTO 2018), is an HE-friendly cipher enjoying the fewest ANDs per bit and the lowest ANDdepth among the existing ciphers. A novel feature of ...
VCC is a mechanical verifier for concurrent C programs. VCC takes a C program, annotated with function specifications, data invariants, loop invariants, and ghost code, and tries to prove these ...
AUDK is a fork of EDK II project focused on security. The main goal of AUDK project is to bring the best practices of secure code development into firmware domain. These practices include (but are not ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results