Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Genelle, Laurie
add a person with the name Genelle, Laurie
 

Other publications of authors with the same name

Montgomery's Trick and Fast Implementation of Masked AES., , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 153-169. Springer, (2011)Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3., , , and . COSADE, volume 8622 of Lecture Notes in Computer Science, page 129-143. Springer, (2014)Secure Multiplicative Masking of Power Functions., , and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 200-217. (2010)Securing AES Implementation against Fault Attacks., , and . FDTC, page 51-62. IEEE Computer Society, (2009)Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model., , , , and . ICETE (Selected Papers), volume 554 of Communications in Computer and Information Science, page 363-379. Springer, (2014)Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model., , , , and . SECRYPT, page 230-241. SciTePress, (2013)Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings., , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 240-255. Springer, (2011)