Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Computation Analysis: Hiding your White-Box Designs is Not Enough., , , and . IACR Cryptology ePrint Archive, (2015)Cryptanalysis of White-Box Implementations., , and . IACR Cryptology ePrint Archive, (2008)Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings., , , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 264-277. Springer, (2007)Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough., , , and . CHES, volume 9813 of Lecture Notes in Computer Science, page 215-236. Springer, (2016)On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography., , , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 103-120. Springer, (2018)On the Guaranteed Throughput of Multizone Disks., , and . IEEE Trans. Computers, 52 (11): 1407-1420 (2003)On the Security Goals of White-Box Cryptography., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (2): 327-357 (2020)Simulated Annealing., , and . Handbook of Approximation Algorithms and Metaheuristics, Chapman and Hall/CRC, (2007)Performance Ratios for the Karmarkar-Karp Differencing Method., , , and . Electron. Notes Discret. Math., (2003)Opportunities in White-Box Cryptography.. IEEE Secur. Priv., 8 (1): 64-67 (2010)