Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Montgomery's Trick and Fast Implementation of Masked AES., , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 153-169. Springer, (2011)Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations., , , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 1-17. Springer, (2013)Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices., , and . CARDIS, volume 5189 of Lecture Notes in Computer Science, page 191-205. Springer, (2008)Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform., , , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 1-14. Springer, (2008)Side-Channel Analysis of Montgomery's Representation Randomization., , and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 212-227. Springer, (2014)Masking against Side-Channel Attacks: A Formal Security Proof., and . EUROCRYPT, volume 7881 of Lecture Notes in Computer Science, page 142-159. Springer, (2013)Higher-Order Masking Schemes for S-Boxes., , , , and . FSE, volume 7549 of Lecture Notes in Computer Science, page 366-384. Springer, (2012)Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations., , and . WISTP, volume 12024 of Lecture Notes in Computer Science, page 66-84. Springer, (2019)Securing AES Implementation against Fault Attacks., , and . FDTC, page 51-62. IEEE Computer Society, (2009)Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing., , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 45-68. Springer, (2017)