Author of the publication

Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning.

, , , , , and . IACR Cryptol. ePrint Arch., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Post Quantum ECC on FPGA Platform., and . IACR Cryptology ePrint Archive, (2019)Number "Not Used" Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates., , , , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 232-250. Springer, (2019)Redefining the Transparency Order., , , , and . IACR Cryptology ePrint Archive, (2014)DFARPA: Differential fault attack resistant physical design automation., , , , , , , and . DATE, page 1171-1174. IEEE, (2018)Accelerating OpenSSL's ECC with low cost reconfigurable hardware., , , and . ISIC, page 1-4. IEEE, (2016)PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs., , , , , , and . IACR Cryptology ePrint Archive, (2017)Function Private Predicate Encryption for Low Min-Entropy Predicates., , and . IACR Cryptology ePrint Archive, (2018)Strengthening NLS Against Crossword Puzzle Attack., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 29-44. Springer, (2007)Modified Transparency Order Property: Solution or Just Another Attempt., , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 210-227. Springer, (2015)Template-Based Fault Injection Analysis of Block Ciphers., , and . SPACE, volume 11348 of Lecture Notes in Computer Science, page 21-36. Springer, (2018)