Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Training Integrable Parameterizations of Deep Neural Networks in the Infinite-Width Limit., , and . CoRR, (2021)On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance.. COSADE, volume 8622 of Lecture Notes in Computer Science, page 56-68. Springer, (2014)Fault Attacks on a Cloud-Assisted ECDSA White-Box Based on the Residue Number System., and . FDTC, page 72-80. IEEE, (2023)On the convex hull of a Brownian excursion with parabolic drift. Stochastic Processes and their Applications, 106 (1): 41--62 (July 2003)Pair Matching: When bandits meet stochastic block model., , , and . CoRR, (2019)ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge., , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (4): 527-552 (2022)ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest., , , , , , , , and . IACR Cryptol. ePrint Arch., (2022)A Systematic Appraisal of Side Channel Evaluation Strategies., , , , , , , , , and 1 other author(s). SSR, volume 12529 of Lecture Notes in Computer Science, page 46-66. Springer, (2020)Provably Secure S-Box Implementation Based on Fourier Transform., , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 216-230. Springer, (2006)On Second-Order Fault Analysis Resistance for CRT-RSA Implementations., , , and . WISTP, volume 5746 of Lecture Notes in Computer Science, page 68-83. Springer, (2009)