Author of the publication

Key Enumeration from the Adversarial Viewpoint.

, , , and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 252-267. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Side-Channel Metric Cheat Sheet., , , , , and . IACR Cryptol. ePrint Arch., (2022)Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?, , , , and . IACR Cryptol. ePrint Arch., (2021)Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?, , , and . IACR Cryptol. ePrint Arch., (2019)Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations., , , , , , , , , and . IACR Cryptol. ePrint Arch., (2022)Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium., , , , and . IACR Cryptol. ePrint Arch., (2023)Blind Side-Channel SIFA., , and . DATE, page 555-560. IEEE, (2021)Shortcut side-channel security evaluations: application to elliptic curve cryptography, masking and shuffling.. Catholic University of Louvain, Louvain-la-Neuve, Belgium, (2021)base-search.net (ftunivlouvain:oai:dial.uclouvain.be:boreal:254418).Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber., , , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 236-256. Springer, (2022)Fast Side-Channel Security Evaluation of ECC Implementations - Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 25-42. Springer, (2019)The Side-channel Metrics Cheat Sheet., , , , , and . ACM Comput. Surv., 55 (10): 216:1-216:38 (2023)