Author of the publication

Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version.

, , , and . IACR Cryptology ePrint Archive, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software mitigations to hedge AES against cache-based software side channel vulnerabilities., , , and . IACR Cryptology ePrint Archive, (2006)A refined look at Bernstein's AES side-channel analysis., , and . AsiaCCS, page 369. ACM, (2006)XTR Implementation on Reconfigurable Hardware., , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 386-399. Springer, (2004)Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version., , , and . IACR Cryptology ePrint Archive, (2004)Advances on Access-Driven Cache Attacks on AES., and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 147-162. Springer, (2006)An Analytical Model for Time-Driven Cache Attacks., , , and . FSE, volume 4593 of Lecture Notes in Computer Science, page 399-413. Springer, (2007)Memories: A Survey of Their Secure Uses in Smart Cards., , , and . IEEE Security in Storage Workshop, page 62-72. IEEE Computer Society, (2003)On the complexity of side-channel attacks on AES-256 - methodology and quantitative results on cache attacks., and . IACR Cryptology ePrint Archive, (2007)Antenna selection and deployment strategies for indoor wireless communication systems., , and . IET Communications, 1 (4): 732-738 (2007)Optimisation of a Multi-Code CDMA In-Building Communication System., , and . VTC Spring, page 846-850. IEEE, (2006)