Author of the publication

CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space.

, , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (12): 4505-4517 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of AES, SKINNY, and Others with Constraint Programming., , , , , , and . IACR Cryptol. ePrint Arch., (2017)SNR-Centric Power Trace Extractors for Side-Channel Attacks., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (4): 620-632 (2021)VGG-based side channel attack on RSA implementation., , , , and . TrustCom, page 1157-1161. IEEE, (2020)Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis., , , , , , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 141-157. Springer, (2015)Improved Differential Analysis of Block Cipher PRIDE., , , , , , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 209-219. Springer, (2015)Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s., , , , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 97-111. Springer, (2015)New Collision Attacks on Round-Reduced Keccak., , , and . EUROCRYPT (3), volume 10212 of Lecture Notes in Computer Science, page 216-243. (2017)CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2021)Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2024)Tighter Security Bound of MIBS Block Cipher against Differential Attack., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 518-525. Springer, (2014)