Author of the publication

Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation.

, , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 125-144. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Algebraic Side-Channel Attacks Against ACORN., , and . ICISC, volume 11396 of Lecture Notes in Computer Science, page 325-340. Springer, (2018)Revisiting Keccak and Dilithium Implementations on ARMv7-M., , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (2): 1-24 (2024)Authenticated Encryption for Very Short Inputs., , and . CT-RSA, volume 13871 of Lecture Notes in Computer Science, page 553-572. Springer, (2023)Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation., , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 125-144. Springer, (2022)Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round., , and . INDOCRYPT, volume 10698 of Lecture Notes in Computer Science, page 65-84. Springer, (2017)Hardware Security Threats Against Bluetooth Mesh Networks., , and . CNS, page 1-9. IEEE, (2018)