Author of the publication

Fiat-shamir identification scheme immune to the hardware fault attacks.

, , and . ACM Trans. Embed. Comput. Syst., 12 (1s): 65:1-65:11 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Differential Fault Analysis on Block Cipher SEED-128., , , and . NBiS, page 675-680. IEEE Computer Society, (2012)Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192., , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 368-383. Springer, (2005)Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1., , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 137-148. Springer, (2004)On the Pseudorandomness of a Modification of KASUMI Type Permutations., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 313-329. Springer, (2004)HIGHT: A New Block Cipher Suitable for Low-Resource Device., , , , , , , , , and 3 other author(s). CHES, volume 4249 of Lecture Notes in Computer Science, page 46-59. Springer, (2006)Provable Security against Differential and Linear Cryptanalysis for the SPN Structure., , , , , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 273-283. Springer, (2000)TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-bit MICAz Mote., , and . IACR Cryptology ePrint Archive, (2008)Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds., , , and . WEWoRC, volume P-74 of LNI, page 64-75. GI, (2005)Low complexity bit-parallel multiplier for F2n defined by repeated polynomials., , and . Discret. Appl. Math., (2018)On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)., , , and . SCN, volume 4116 of Lecture Notes in Computer Science, page 242-256. Springer, (2006)