Author of the publication

Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste.

, , , and . APKC@AsiaCCS, page 10-20. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste., , , and . APKC@AsiaCCS, page 10-20. ACM, (2023)A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations., , and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 450-471. Springer, (2022)TCIC: Theme Concepts Learning Cross Language and Vision for Image Captioning., , , , , , and . IJCAI, page 657-663. ijcai.org, (2021)ADSNet: Cross-Domain LTV Prediction with an Adaptive Siamese Network in Advertising., , , , , , , , and . KDD, page 5872-5881. ACM, (2024)K-AID: Enhancing Pre-trained Language Models with Domain Knowledge for Question Answering., , , , , and . CIKM, page 4125-4134. ACM, (2021)An Autonomous Robot for Collision-Free Person Following through Model Predictive Control., , , and . IECON, page 1-6. IEEE, (2023)A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts., and . C2SI, volume 13874 of Lecture Notes in Computer Science, page 109-128. Springer, (2023)Analysis and Evaluation of the Effects of Single Event Upsets (SEU s) on Memories in Polar Decoders., , , and . DFT, page 1-6. IEEE, (2021)Look, Listen, and Attend: Co-Attention Network for Self-Supervised Audio-Visual Representation Learning., , , , and . ACM Multimedia, page 3884-3892. ACM, (2020)Leveraging Declarative Knowledge in Text and First-Order Logic for Fine-Grained Propaganda Detection., , , , , , , and . EMNLP (1), page 3895-3903. Association for Computational Linguistics, (2020)