Author of the publication

Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks.

, , , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 200-215. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strictly chained (p,q)-ary partitions, and . CoRR, (2012)Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences., , and . IACR Cryptology ePrint Archive, (2015)Breaking Randomized Mixed-Radix Scalar Multiplication Algorithms., and . LATINCRYPT, volume 11774 of Lecture Notes in Computer Science, page 24-39. Springer, (2019)Side-Channel Attacks on Blinded Scalar Multiplications Revisited., , and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 95-108. Springer, (2019)Arithmetic Operations in Finite Fields of Medium Prime Characteristic Using the Lagrange Representation., , and . IEEE Trans. Computers, 55 (9): 1167-1177 (2006)Faster Cofactorization with ECM Using Mixed Representations., and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 483-504. Springer, (2020)Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography., , and . IACR Cryptology ePrint Archive, (2008)Randomized Mixed-Radix Scalar Multiplication., , and . IEEE Trans. Computers, 67 (3): 418-431 (2018)Balanced NUCOMP., , and . CASC, volume 12291 of Lecture Notes in Computer Science, page 402-420. Springer, (2020)Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks., , , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 200-215. Springer, (2013)