Author of the publication

Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection.

, , , , , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 236-252. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving DPA resistance of S-boxes: How far can we go?, , , and . ISCAS, page 2013-2016. IEEE, (2015)On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials., and . IACR Cryptology ePrint Archive, (2017)Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , and . IACR Cryptology ePrint Archive, (2017)Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (4): 828-861 (2022)Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions., , , and . CoRR, (2023)SoK: Deep Learning-based Physical Side-channel Analysis., , , , and . ACM Comput. Surv., 55 (11): 227:1-227:35 (November 2023)Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand., , , , , and . USENIX Security Symposium, page 1687-1704. USENIX Association, (2022)The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption., , , , , , and . NDSS, The Internet Society, (2023)Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 809-829. Springer, (2022)Applications of Soft Computing in Cryptology.. WISA, volume 10144 of Lecture Notes in Computer Science, page 305-317. (2016)