Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Masking vs. multiparty computation: how large is the gap for AES?, , and . J. Cryptographic Engineering, 4 (1): 47-57 (2014)Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection., , , , , , , and . IACR Cryptology ePrint Archive, (2018)Optimal Collision Side-Channel Attacks., and . IACR Cryptology ePrint Archive, (2019)Masking Proofs are Tight (and How to Exploit it in Security Evaluations)., and . IACR Cryptology ePrint Archive, (2017)Efficient Masked S-Boxes Processing - A Step Forward -., , and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 251-266. Springer, (2014)Strong 8-bit Sboxes with efficient masking in hardware extended version., , , , , and . J. Cryptographic Engineering, 7 (2): 149-165 (2017)Masking vs. Multiparty Computation: How Large is the Gap for AES?, , and . IACR Cryptology ePrint Archive, (2015)Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint., , and . IACR Cryptology ePrint Archive, (2018)On the Cost of Lazy Engineering for Masked Software Implementations., , , , and . CARDIS, volume 8968 of Lecture Notes in Computer Science, page 64-81. Springer, (2014)Strong 8-bit Sboxes with Efficient Masking in Hardware., , , , , and . CHES, volume 9813 of Lecture Notes in Computer Science, page 171-193. Springer, (2016)