Author of the publication

Breaking Kalyna 128/128 with Power Attacks.

, , , , and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 402-414. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Markowitch, Olivier
add a person with the name Markowitch, Olivier
 

Other publications of authors with the same name

A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme., , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 282-288. Springer, (2013)A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures., and . Security and Management, page 314-317. CSREA Press, (2009)Automating Feature Extraction and Feature Selection in Big Data Security Analytics., and . ICAISC (2), volume 10842 of Lecture Notes in Computer Science, page 423-432. Springer, (2018)Generic Framework for Attribute-Based Group Signature., , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 814-834. Springer, (2017)Secure Certificateless Proxy Re-encryption Without Pairing., , , , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 85-101. Springer, (2017)On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices., , , and . ICISC, volume 10779 of Lecture Notes in Computer Science, page 284-309. Springer, (2017)Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage., , , , and . ICETE (2), page 207-218. SciTePress, (2018)Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics., and . ICDIS, page 43-48. IEEE, (2018)Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version., , , and . J. Cryptographic Engineering, 8 (4): 301-313 (2018)Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark., and . CoRR, (2017)