Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault Analysis of Grain-128., , , , , , , and . HOST, page 7-14. IEEE Computer Society, (2009)A Survey of Differential Fault Analysis Against Classical RSA Implementations., , and . Fault Analysis in Cryptography, Springer, (2012)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Improved Algorithms for Isomorphisms of Polynomials., , and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 184-200. Springer, (1998)Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator., and . FSE, volume 5086 of Lecture Notes in Computer Science, page 235-252. Springer, (2008)What do DES S-boxes Say to Each Other ?, , and . IACR Cryptology ePrint Archive, (2003)Trap Me If You Can - Million Dollar Curve., , , , , and . IACR Cryptology ePrint Archive, (2015)Attacking FHE-based applications by software fault injections., , and . IACR Cryptology ePrint Archive, (2016)Sosemanuk, a Fast Software-Oriented Stream Cipher., , , , , , , , , and 2 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)On the Design of a Processor Working Over Encrypted Data., , and . DSD, page 577-580. IEEE Computer Society, (2018)