From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Low-Latency and Low-Randomness Second-Order Masked Cubic Functions., , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (1): 113-152 (2023)StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations., , и . IACR Cryptol. ePrint Arch., (2023)First-Order Hardware Sharings of the AES., , и . IACR Cryptol. ePrint Arch., (2021)MARVELlous: a STARK-Friendly Family of Cryptographic Primitives., и . IACR Cryptology ePrint Archive, (2018)An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes., , , , , , , и . IACR Cryptol. ePrint Arch., (2022)StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations., , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (1): 229-263 (2024)Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution)., , , , и . IACR Cryptology ePrint Archive, (2019)Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)., и . IACR Cryptol. ePrint Arch., (2020)The Random Fault Model., и . SAC, том 14201 из Lecture Notes in Computer Science, стр. 191-212. Springer, (2023)Cryptanalysis of Masked Ciphers: A Not So Random Idea., , и . ASIACRYPT (1), том 12491 из Lecture Notes in Computer Science, стр. 817-850. Springer, (2020)