Author of the publication

A Tamper and Leakage Resilient von Neumann Architecture.

, , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 579-603. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device., , and . EUROCRYPT (1), volume 9056 of Lecture Notes in Computer Science, page 401-429. Springer, (2015)Unifying Leakage Models: From Probing Attacks to Noisy Leakage., , and . EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, page 423-440. Springer, (2014)Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version., , and . J. Cryptol., 32 (4): 1263-1297 (2019)Efficient Leakage Resilient Circuit Compilers., , , , and . CT-RSA, volume 9048 of Lecture Notes in Computer Science, page 311-329. Springer, (2015)Bitcoin-Compatible Virtual Channels., , , , , , , and . SP, page 901-918. IEEE, (2021)Combined Fault and Leakage Resilience: Composability, Constructions and Compiler., , , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 377-409. Springer, (2023)FairSwap: How To Fairly Exchange Digital Goods., , and . ACM Conference on Computer and Communications Security, page 967-984. ACM, (2018)Continuous Non-malleable Codes., , , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 465-488. Springer, (2014)The Chaining Lemma and Its Application., , , and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 181-196. Springer, (2015)Secure Two-Party Computation with Low Communication., , and . IACR Cryptology ePrint Archive, (2011)