Author of the publication

Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling.

, , , , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Bit-Dependent Attack on Protected PKC Using a Single Trace., and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 168-185. Springer, (2017)Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure., , , , and . ICISC (1), volume 14561 of Lecture Notes in Computer Science, page 185-201. Springer, (2023)Differential Fault Attack on Lightweight Block Cipher PIPO., , , and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 296-307. Springer, (2021)Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts., and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 235-245. Springer, (2022)A new bit-serial multiplier over GF(pm) using irreducible trinomials., , , , and . Comput. Math. Appl., 60 (2): 355-361 (2010)Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT., , , and . ICCST, page 1-5. IEEE, (2011)Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations., , , and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 119-134. Springer, (2006)Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices., , , , and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 238-253. Springer, (2007)Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains., , , , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 67-78. Springer, (2003)Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication., and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 334-348. Springer, (2003)