Author of the publication

Protecting the Control Flow of Embedded Processors against Fault Attacks.

, , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 161-176. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting the Control Flow of Embedded Processors against Fault Attacks., , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 161-176. Springer, (2015)MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks., , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 361-379. Springer, (2014)Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices., and . ARES, page 69-77. IEEE Computer Society, (2014)Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs., and . IACR Cryptology ePrint Archive, (2015)Ascon hardware implementations and side-channel evaluation., , , and . Microprocessors and Microsystems - Embedded Hardware Design, (2017)Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors., and . J. Cryptology, 31 (4): 1164-1182 (2018)Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices., , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 92-106. Springer, (2010)Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware., , and . RFIDSec, volume 8262 of Lecture Notes in Computer Science, page 128-144. Springer, (2013)An 8-bit AVR-Based Elliptic Curve Cryptographic RISC Processor for the Internet of Things., and . MICRO Workshops, page 39-46. IEEE Computer Society, (2012)Suit up! - Made-to-Measure Hardware Implementations of ASCON., , , and . DSD, page 645-652. IEEE Computer Society, (2015)