Author of the publication

Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?

, , , and . IACR Cryptol. ePrint Arch., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (1): 231-255 (2020)Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?, , , and . IACR Cryptol. ePrint Arch., (2019)On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices., , , , , and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 205-227. Springer, (2020)SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (1): 95-122 (2020)Mitigating Power Attacks through Fine-Grained Instruction Reordering., , , , , and . CoRR, (2021)Fast Side-Channel Security Evaluation of ECC Implementations - Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 25-42. Springer, (2019)A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 461-481 (2022)Secure Your SoC: Building System-an-Chip Designs for Security., , , , , , and . SoCC, page 248-253. IEEE, (2020)On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4., , , and . SPACE, volume 12586 of Lecture Notes in Computer Science, page 123-146. Springer, (2020)Key Enumeration from the Adversarial Viewpoint., , , and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 252-267. Springer, (2019)