Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standard Lattice-Based Key Encapsulation on Embedded Devices., , , and . IACR Cryptology ePrint Archive, (2018)Evaluation of Lattice-Based Signature Schemes in Embedded Systems., , , and . ICECS, page 385-388. IEEE, (2018)Efficiently Masking Polynomial Inversion at Arbitrary Order., , , and . PQCrypto, volume 13512 of Lecture Notes in Computer Science, page 309-326. Springer, (2022)BasicBlocker: Redesigning ISAs to Eliminate Speculative-Execution Attacks., , , , and . CoRR, (2020)A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling., , , and . Public Key Cryptography (2), volume 13941 of Lecture Notes in Computer Science, page 94-124. Springer, (2023)BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs Faster., , , , and . RAID, page 103-118. ACM, (2021)Three Sidekicks to Support Spectre Countermeasures., , , , and . DATE, page 1-6. IEEE, (2024)Generic Accelerators for Costly-to-Mask PQC Components., , , , , , and . IACR Cryptol. ePrint Arch., (2023)Carry-Less to BIKE Faster., , , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 833-852. Springer, (2022)