Author of the publication

Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems.

, , , , , , and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 219-234. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Collision Side-Channel Attacks., and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 126-140. Springer, (2019)Emulating Side Channel Attacks on gem5: lessons learned., , and . EuroS&P Workshops, page 287-295. IEEE, (2023)Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks., , , , and . CARDIS, volume 14530 of Lecture Notes in Computer Science, page 235-255. Springer, (2023)Self-timed Masking: Implementing Masked S-Boxes Without Registers., , , , , and . CARDIS, volume 13820 of Lecture Notes in Computer Science, page 146-164. Springer, (2022)Integer Syndrome Decoding in the Presence of Noise., , , and . ITW, page 482-487. IEEE, (2022)Low-Latency Masking with Arbitrary Protection Order Based on Click Elements., , , , , and . HOST, page 36-47. IEEE, (2023)Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece., , , and . COSADE, volume 13979 of Lecture Notes in Computer Science, page 170-192. Springer, (2023)Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?, , , , and . IACR Cryptol. ePrint Arch., (2021)A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial., , , , , , , and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 105-125. Springer, (2023)Switching Off your Device Does Not Protect Against Fault Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2024)