Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm., , , , and . Inf., 12 (11): 462 (2021)Fault Injection Method for Hardware-implemented AES without Artificial Triggering., , , , , and . ICEA, page 40:1-40:6. ACM, (2020)PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations., , , , , , , , , and 1 other author(s). ICISC, volume 12593 of Lecture Notes in Computer Science, page 99-122. Springer, (2020)Chosen-Ciphertext Clustering Attack on CRYSTALS-KYBER Using the Side-Channel Leakage of Barrett Reduction., , and . IEEE Internet Things J., 9 (21): 21382-21397 (2022)Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling., , , , , , , and . IEEE Access, (2021)A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2020)Improved Correlation Power Analysis on Bitslice Block Ciphers., , , , and . IEEE Access, (2022)Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication., , and . ICEA, page 32:1-32:6. ACM, (2020)Key Bit-Dependent Attack on Protected PKC Using a Single Trace., and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 168-185. Springer, (2017)