Author of the publication

Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey.

, , , and . SAMOS, page 167-172. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption., , and . INDOCRYPT, volume 10698 of Lecture Notes in Computer Science, page 282-301. Springer, (2017)Protecting block ciphers against differential fault attacks without re-keying., , , , and . HOST, page 191-194. IEEE Computer Society, (2018)New polynomial basis versatile multiplier over GF(2m) for low-power on-chip crypto-systems., and . ISCAS, page 1438-1441. IEEE, (2015)Forgery Attack on mixFeed in the Nonce-Misuse Scenario.. IACR Cryptology ePrint Archive, (2019)A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates., , , and . IACR Cryptology ePrint Archive, (2017)Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey., , , and . SAMOS, page 167-172. ACM, (2018)FPGA implementation of high speed XTS-AES for data storage devices., , , , , and . ICITST, page 25-28. IEEE, (2011)A Hardware-Efficient Implementation of CLOC for On-chip Authenticated Encryption., , , and . ISVLSI, page 311-315. IEEE Computer Society, (2018)Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)., , , , and . IACR Cryptology ePrint Archive, (2018)Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed.. IACR Cryptology ePrint Archive, (2019)