Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A More Efficient AES Threshold Implementation., , , , and . IACR Cryptology ePrint Archive, (2013)Mutual Information Analysis - A Universal Differential Side-Channel Attack., , and . IACR Cryptology ePrint Archive, (2007)Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers., , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 196-212. Springer, (2017)Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices., , and . ICISC, volume 5461 of Lecture Notes in Computer Science, page 253-267. Springer, (2008)Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration., , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 346-362. Springer, (2008)Trade-Offs for Threshold Implementations Illustrated on AES., , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (7): 1188-1200 (2015)On the Cost of Lazy Engineering for Masked Software Implementations., , , , and . CARDIS, volume 8968 of Lecture Notes in Computer Science, page 64-81. Springer, (2014)Perfect Matching Disclosure Attacks., , , and . Privacy Enhancing Technologies, volume 5134 of Lecture Notes in Computer Science, page 2-23. Springer, (2008)Signal Processing for Cryptography and Security Applications., , , , , , , and . Handbook of Signal Processing Systems, Springer, (2013)Mutual Information Analysis: a Comprehensive Study., , , , , and . J. Cryptology, 24 (2): 269-291 (2011)