Author of the publication

Protecting the Control Flow of Embedded Processors against Fault Attacks.

, , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 161-176. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting the Control Flow of Embedded Processors against Fault Attacks., , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 161-176. Springer, (2015)Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs., and . IACR Cryptology ePrint Archive, (2015)Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors., and . J. Cryptol., 33 (4): 1442-1460 (2020)Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices., and . ARES, page 69-77. IEEE Computer Society, (2014)Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware., , and . RFIDSec, volume 8262 of Lecture Notes in Computer Science, page 128-144. Springer, (2013)Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices., , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 92-106. Springer, (2010)Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors., and . J. Cryptol., 31 (4): 1164-1182 (2018)Ascon hardware implementations and side-channel evaluation., , , and . Microprocess. Microsystems, (2017)Suit up! - Made-to-Measure Hardware Implementations of ASCON., , , and . DSD, page 645-652. IEEE Computer Society, (2015)An 8-bit AVR-Based Elliptic Curve Cryptographic RISC Processor for the Internet of Things., and . MICRO Workshops, page 39-46. IEEE Computer Society, (2012)