Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak., , and . IACR Cryptology ePrint Archive, (2018)Masked SABL: A Long Lasting Side-Channel Protection Design Methodology., , , and . IEEE Access, (2021)Hardware Masking, Revisited., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (2): 123-148 (2018)Generic Hardware Private Circuits Towards Automated Generation of Composable Secure Gadgets., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 323-344 (2022)Spin Me Right Round Rotational Symmetry for FPGA-Specific AES., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 596-626 (2018)Cryptographic Fault Diagnosis using VerFI., , , and . HOST, page 229-240. IEEE, (2020)Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model., , , , and . SP, page 1955-1971. IEEE, (2021)Impeccable Circuits III., , and . ITC, page 163-169. IEEE, (2021)Dual-rail transition logic: A logic style for counteracting power analysis attacks., , and . Comput. Electr. Eng., 35 (2): 359-369 (2009)Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs., , and . COSADE, volume 9064 of Lecture Notes in Computer Science, page 81-94. Springer, (2015)