Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossible Differential Attack on Reduced-Round TWINE., and . ICISC, volume 8565 of Lecture Notes in Computer Science, page 123-143. Springer, (2013)A note on BDD problems with λ2-gap., , , and . Inf. Process. Lett., 114 (1-2): 9-12 (2014)Shortest Lattice Vectors in the Presence of Gaps., , , and . IACR Cryptology ePrint Archive, (2011)Cryptanalysis of RSA with a small parameter revisited., and . Inf. Process. Lett., 115 (11): 858-862 (2015)Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing., , , , , and . IEEE Access, (2019)Efficient collision attacks on smart card implementations of masked AES., , , , , , and . Sci. China Inf. Sci., 58 (5): 1-15 (2015)Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks., , and . KSII Trans. Internet Inf. Syst., 7 (5): 1094-1107 (2013)Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices., , , , , and . Comput. Electr. Eng., (2017)Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis., , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 232-246. Springer, (2014)First-order collision attack on protected NTRU cryptosystem., , and . Microprocess. Microsystems, 37 (6-7): 601-609 (2013)