Author of the publication

A Tolerant Algebraic Side-Channel Attack on AES Using CP.

, , , , and . CP, volume 10416 of Lecture Notes in Computer Science, page 189-205. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebraic Side-Channel Attack on Twofish., , and . J. Internet Serv. Inf. Secur., 7 (2): 32-43 (2017)Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques., , , , , and . FDTC, page 41-51. IEEE Computer Society, (2013)Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations., , , , , , and . IEEE Trans. Inf. Forensics Secur., 9 (6): 999-1014 (2014)A Tolerant Algebraic Side-Channel Attack on AES Using CP., , , , and . CP, volume 10416 of Lecture Notes in Computer Science, page 189-205. Springer, (2017)Influence of Error on Hamming Weights for ASCA., , , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 447-460. Springer, (2017)Hardware Root-of-Trust implementations in Trusted Execution Environments., , , , and . IACR Cryptol. ePrint Arch., (2023)CARAF: Crypto Agility Risk Assessment Framework., , , , and . J. Cybersecur., (2021)Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering., , , , , , and . FDTC, page 29-39. IEEE Computer Society, (2014)Error Tolerant ASCA on FPGA., and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 563-572. Springer, (2018)