Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight 1.16 pJ/bit Processor for the Authenticated Encryption Scheme KetjeSR., , , , , and . VLSI-DAT, page 1-4. IEEE, (2019)ShowTime: Amplifying Arbitrary CPU Timing Side Channels., , , and . AsiaCCS, page 205-217. ACM, (2023)Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks., , , , , , and . SP, page 2273-2287. IEEE, (2023)Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function., , , , , and . ACNS (2), volume 14584 of Lecture Notes in Computer Science, page 433-459. Springer, (2024)Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE., , , , and . CARDIS, volume 12609 of Lecture Notes in Computer Science, page 68-83. Springer, (2020)Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages., , , , , and . ASIACRYPT (2), volume 11922 of Lecture Notes in Computer Science, page 153-182. Springer, (2019)Trade-offs in Protecting Keccak Against Combined Side-Channel and Fault Attacks., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 285-302. Springer, (2019)Prime+Scope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks., , and . CCS, page 2906-2920. ACM, (2021)Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies., , and . USENIX Security Symposium, page 3647-3664. USENIX Association, (2022)SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution., , , , and . USENIX Security Symposium, page 6293-6310. USENIX Association, (2023)