Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Second Look at the ASCAD Databases., , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 75-99. Springer, (2022)Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA., , , and . IEEE Trans. Inf. Forensics Secur., (2021)Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)FuLeeca: A Lee-Based Signature Scheme., , , , , , , and . CBCrypto, volume 14311 of Lecture Notes in Computer Science, page 56-83. Springer, (2023)A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem., , , , and . PQCrypto, volume 13512 of Lecture Notes in Computer Science, page 327-352. Springer, (2022)Efficient Hardware/Software Co-design for NTRU., , , , , and . VLSI-SoC (Selected Papers), volume 561 of IFIP Advances in Information and Communication Technology, page 257-280. Springer, (2018)Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs - An Evaluation of the ASCAD Databases., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 139-158. Springer, (2023)Secure and Compact Full NTRU Hardware Implementation., , , , and . VLSI-SoC, page 89-94. IEEE, (2018)Information-Set Decoding with Hints., , , , and . CBCrypto, volume 13150 of Lecture Notes in Computer Science, page 60-83. Springer, (2021)Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers., , , , , and . IACR Cryptol. ePrint Arch., (2020)