Author of the publication

ISA Extensions of Shuffling Against Side-Channel Attacks.

, , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (3): 761-773 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebraic Attacks on Round-Reduced Rain and Full AIM-III., , , , and . ASIACRYPT (3), volume 14440 of Lecture Notes in Computer Science, page 285-310. Springer, (2023)Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures., , , , , , and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 41-60. Springer, (2022)Provable Security of rmHADES Structure., and . CANS, volume 13641 of Lecture Notes in Computer Science, page 258-276. Springer, (2022)Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks., , and . CANS, volume 14342 of Lecture Notes in Computer Science, page 101-125. Springer, (2023)Towards Data-Driven Modelling of Sumoylation Following Heat Shock., , , , and . ICBBE, page 16-21. ACM, (2020)DSANA: A distributed machine learning acceleration solution based on dynamic scheduling and network acceleration., , , and . HPCC/DSS/SmartCity, page 302-311. IEEE, (2020)Full-Text Citation Analysis: A New Method to Enhance Scholarly Network, , and . Journal of the American Society for Information Science and Technology, (2012)Characterize scientific domain and domain context., , and . JCDL, page 359-360. ACM, (2012)A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers., and . ASIACRYPT (2), volume 9453 of Lecture Notes in Computer Science, page 389-410. Springer, (2015)TNT: How to Tweak a Block Cipher., , , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 641-673. Springer, (2020)