Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Bit-Dependent Attack on Protected PKC Using a Single Trace., and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 168-185. Springer, (2017)A new bit-serial multiplier over GF(pm) using irreducible trinomials., , , , and . Comput. Math. Appl., 60 (2): 355-361 (2010)Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT., , , and . ICCST, page 1-5. IEEE, (2011)Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure., , , , and . ICISC (1), volume 14561 of Lecture Notes in Computer Science, page 185-201. Springer, (2023)Differential Fault Attack on Lightweight Block Cipher PIPO., , , and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 296-307. Springer, (2021)Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts., and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 235-245. Springer, (2022)Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations., , , and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 119-134. Springer, (2006)Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices., , , , and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 238-253. Springer, (2007)Improved Correlation Power Analysis on Bitslice Block Ciphers., , , , and . IEEE Access, (2022)Construction of efficient and secure pairing algorithm and its application., , and . J. Commun. Networks, 10 (4): 437-443 (2008)