Author of the publication

Counteracting Power Analysis Attacks by Masking.

, and . Secure Integrated Circuits and Systems, Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power analysis attacks - revealing the secrets of smart cards., , and . Springer, (2007)Template Attacks on ECDSA., and . WISA, volume 5379 of Lecture Notes in Computer Science, page 14-27. Springer, (2008)Practical Template Attacks., and . WISA, volume 3325 of Lecture Notes in Computer Science, page 440-456. Springer, (2004)One for all - all for one: unifying standard differential power analysis attacks., , and . IET Information Security, 5 (2): 100-110 (2011)An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis., , and . IACR Cryptology ePrint Archive, (2011)A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices., , , and . IACR Cryptology ePrint Archive, (2013)How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack., , , and . IACR Cryptology ePrint Archive, (2015)Categorising and Comparing Cluster-Based DPA Distinguishers., , , , and . SAC, volume 10719 of Lecture Notes in Computer Science, page 442-458. Springer, (2017)A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher., , , , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 70-87. Springer, (2017)A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AES., , and . CARDIS, volume 11389 of Lecture Notes in Computer Science, page 18-34. Springer, (2018)