Author of the publication

Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder.

, , and . IACR Cryptol. ePrint Arch., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations., , , , , , , , , and . IACR Cryptol. ePrint Arch., (2022)The Side-Channel Metric Cheat Sheet., , , , , and . IACR Cryptol. ePrint Arch., (2022)Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?, , , , and . IACR Cryptol. ePrint Arch., (2021)Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?, , , and . IACR Cryptol. ePrint Arch., (2019)Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium., , , , and . IACR Cryptol. ePrint Arch., (2023)Blind Side-Channel SIFA., , and . DATE, page 555-560. IEEE, (2021)The Side-channel Metrics Cheat Sheet., , , , , and . ACM Comput. Surv., 55 (10): 216:1-216:38 (2023)Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?, , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (2): 140-165 (2022)A Systematic Appraisal of Side Channel Evaluation Strategies., , , , , , , , , and 1 other author(s). SSR, volume 12529 of Lecture Notes in Computer Science, page 46-66. Springer, (2020)On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices., , , , , and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 205-227. Springer, (2020)