Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Cryptography for Packet Level Authentication.. Security and Management, page 475-480. CSREA Press, (2008)SoK: Remote Power Analysis., , and . ARES, page 7:1-7:12. ACM, (2021)HyperDegrade: From GHz to MHz Effective CPU Frequencies., and . USENIX Security Symposium, page 2801-2818. USENIX Association, (2022)Certified Side Channels., , , , , and . USENIX Security Symposium, page 2021-2038. USENIX Association, (2020)Bit-Sliced Binary Normal Basis Multiplication., and . IEEE Symposium on Computer Arithmetic, page 205-212. IEEE Computer Society, (2011)Batch Binary Weierstrass., , , , and . LATINCRYPT, volume 11774 of Lecture Notes in Computer Science, page 364-384. Springer, (2019)Secure and Fast Implementations of Two Involution Ciphers.. NordSec, volume 7127 of Lecture Notes in Computer Science, page 269-282. Springer, (2010)New Results on Instruction Cache Attacks., , and . CHES, volume 6225 of Lecture Notes in Computer Science, page 110-124. Springer, (2010)Cache-Timing Attacks on RSA Key Generation., , , and . IACR Cryptology ePrint Archive, (2018)Constant-Time Callees with Variable-Time Callers., and . USENIX Security Symposium, page 83-98. USENIX Association, (2017)