Author of the publication

Similar operation template attack on RSA-CRT as a case study.

, , , , , , , , , and . Sci. China Inf. Sci., 61 (3): 032111:1-032111:17 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Constant Time Modular Inversions Over Prime Fields., , , , , , and . CIS, page 524-528. IEEE Computer Society, (2017)Efficient Implementation of Tate Pairing with Montgomery Ladder Method., , and . INCoS, page 398-402. IEEE, (2013)Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication., and . Cryptologia, 33 (4): 315-320 (2009)Practical Partial-Nonce-Exposure Attack on ECC Algorithm., , , , , , , , and . CIS, page 248-252. IEEE Computer Society, (2017)Further Research on N-1 Attack against Exponentiation Algorithms., , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 162-175. Springer, (2014)Efficient Pairing Computation on Elliptic Curves in Hessian Form., , and . ICISC, volume 6829 of Lecture Notes in Computer Science, page 169-176. Springer, (2010)Scheduling Spark Tasks With Data Skew and Deadline Constraints., , and . IEEE Access, (2021)Similar operation template attack on RSA-CRT as a case study., , , , , , , , , and . Sci. China Inf. Sci., 61 (3): 032111:1-032111:17 (2018)Scheduling method with adaptive learning for microservice workflows with hybrid resource provisioning., , , and . Int. J. Mach. Learn. Cybern., 12 (10): 3037-3048 (2021)Efficient Pairing Computation on Huff Curves., , , and . Cryptologia, 39 (3): 270-275 (2015)