Author of the publication

Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures.

, and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 118-129. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences., , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 222-235. Springer, (2013)Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents., and . TrustCom/BigDataSE/ISPA (1), page 82-89. IEEE, (2015)Observability Analysis - Detecting When Improved Cryptosystems Fail., , , and . CT-RSA, volume 2271 of Lecture Notes in Computer Science, page 17-29. Springer, (2002)Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces.. ACISP, volume 2727 of Lecture Notes in Computer Science, page 106-117. Springer, (2003)One-Way Cross-Trees and Their Applications., and . Public Key Cryptography, volume 2274 of Lecture Notes in Computer Science, page 346-356. Springer, (2002)Cryptanalysis of Two Proxy Signature Schemes with Restricted Times of Delegation., and . ICISA, page 1-4. IEEE, (2013)On the Design of Conference Key Distribution Systems for the Broadcasting Networks., and . INFOCOM, page 1406-1413. IEEE Computer Society, (1993)Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption., , , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 183-195. Springer, (2005)A CRT-Based RSA Countermeasure Against Physical Cryptanalysis., , , , and . HPCC, volume 3726 of Lecture Notes in Computer Science, page 549-554. Springer, (2005)RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis., , , and . IEEE Trans. Computers, 52 (4): 461-472 (2003)