Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices., , , , , and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 205-227. Springer, (2020)SITM: See-In-The-Middle-Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers., , , , , and . IACR Cryptology ePrint Archive, (2020)Mitigating Power Attacks through Fine-Grained Instruction Reordering., , , , , and . CoRR, (2021)Fast Side-Channel Security Evaluation of ECC Implementations - Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 25-42. Springer, (2019)On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4., , , and . SPACE, volume 12586 of Lecture Notes in Computer Science, page 123-146. Springer, (2020)Secure Your SoC: Building System-an-Chip Designs for Security., , , , , , and . SoCC, page 248-253. IEEE, (2020)Key Enumeration from the Adversarial Viewpoint., , , and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 252-267. Springer, (2019)