Author of the publication

Cache Timing Attacks on Clefia.

, , , and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 104-118. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Brand Validation: Security Indicator to Better Indicate Website Identity., , , , , and . HCI (27), volume 12788 of Lecture Notes in Computer Science, page 432-447. Springer, (2021)Improved Differential Fault Analysis on CLEFIA., and . FDTC, page 25-34. IEEE Computer Society, (2008)Scalar Multiplication on Koblitz Curves using tau2-NAF., , , , and . IACR Cryptology ePrint Archive, (2011)Differential Fault Analysis on the AES Key Schedule., and . IACR Cryptology ePrint Archive, (2007)Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers., and . FDTC, page 84-92. IEEE Computer Society, (2009)Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient., , , and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 286-301. Springer, (2013)Differential Fault Analysis on AES with 192 and 256-Bit Keys., and . IACR Cryptology ePrint Archive, (2010)DFA Mechanism on the AES Key Schedule., , and . FDTC, page 62-74. IEEE Computer Society, (2007)Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 136-143 (2010)Fault Analysis on SIMON Family of Lightweight Block Ciphers., and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 175-189. Springer, (2014)