Author of the publication

Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.

, , , , , , and . IACR Cryptology ePrint Archive, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verified Proofs of Higher-Order Masking., , , , , and . EUROCRYPT (1), volume 9056 of Lecture Notes in Computer Science, page 457-485. Springer, (2015)Masking the GLP Lattice-Based Signature Scheme at Any Order., , , , , , and . EUROCRYPT (2), volume 10821 of Lecture Notes in Computer Science, page 354-384. Springer, (2018)Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis., , , , , , , and . J. Cryptographic Engineering, 4 (3): 157-171 (2014)Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model., , , , and . SECRYPT, page 230-241. SciTePress, (2013)Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?, , and . IACR Cryptology ePrint Archive, (2014)Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model., , , , and . ICETE (Selected Papers), volume 554 of Communications in Computer and Information Science, page 363-379. Springer, (2014)GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited., , , , , and . CCS, page 2147-2164. ACM, (2019)Randomness Complexity of Private Circuits for Multiplication., , , , , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 616-648. Springer, (2016)Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations., , , , , , and . IACR Cryptology ePrint Archive, (2018)Leakage-Resilient Symmetric Encryption via Re-keying., , and . IACR Cryptology ePrint Archive, (2015)