Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems., , , and . J. Cryptographic Engineering, 1 (4): 271-281 (2011)Differential fault analysis of AES: towards reaching its limits., , and . J. Cryptographic Engineering, 3 (2): 73-97 (2013)Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes., , , and . FDTC, page 72-82. IEEE Computer Society, (2012)Exploiting Collisions in Addition Chain-based Exponentiation Algorithms., , and . IACR Cryptology ePrint Archive, (2012)Experimenting with Faults, Lattices and the DSA., , , and . IACR Cryptology ePrint Archive, (2004)Efficient Use of Random Delays in Embedded Software., and . WISTP, volume 4462 of Lecture Notes in Computer Science, page 27-38. Springer, (2007)Fault Analysis of DPA-Resistant Algorithms., , and . FDTC, volume 4236 of Lecture Notes in Computer Science, page 223-236. Springer, (2006)Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications., , , and . ICISC, volume 5984 of Lecture Notes in Computer Science, page 176-192. Springer, (2009)Inhibiting Card Sharing Attacks., , and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 239-251. Springer, (2006)Using templates to distinguish multiplications from squaring operations., , and . Int. J. Inf. Sec., 10 (4): 255-266 (2011)