Author of the publication

Enhanced Doubling Attacks on Signed-All-Bits Set Recoding.

, , , , , and . WISTP, volume 4462 of Lecture Notes in Computer Science, page 39-52. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge-centric modulo scheduling for coarse-grained reconfigurable architectures., , , , , and . PACT, page 166-176. ACM, (2008)Enhanced Doubling Attacks on Signed-All-Bits Set Recoding., , , , , and . WISTP, volume 4462 of Lecture Notes in Computer Science, page 39-52. Springer, (2007)Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing., , and . IACR Cryptology ePrint Archive, (2020)Cloning Hardware Wallet Without Valid Credentials Through Side-Channel Analysis of Hash Function., , , and . IEEE Access, (2024)A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure., , , and . IEEE Access, (2020)A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure., , , and . IEEE Access, (2019)KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates., , , , , , and . IEEE Access, (2024)A Fast and Provably Secure Higher-Order Masking of AES S-Box., , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 95-107. Springer, (2011)A Malware Classification Method Based on Generic Malware Information., , , and . ICONIP (2), volume 9490 of Lecture Notes in Computer Science, page 329-336. Springer, (2015)A Methodology for Multipurpose DNS Sinkhole Analyzing Double Bounce Emails., , and . ICONIP (1), volume 8226 of Lecture Notes in Computer Science, page 609-616. Springer, (2013)