Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emulating Side Channel Attacks on gem5: lessons learned., , and . EuroS&P Workshops, page 287-295. IEEE, (2023)Optimal Collision Side-Channel Attacks., and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 126-140. Springer, (2019)Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks., , , , and . CARDIS, volume 14530 of Lecture Notes in Computer Science, page 235-255. Springer, (2023)Self-timed Masking: Implementing Masked S-Boxes Without Registers., , , , , and . CARDIS, volume 13820 of Lecture Notes in Computer Science, page 146-164. Springer, (2022)Low-Latency Masking with Arbitrary Protection Order Based on Click Elements., , , , , and . HOST, page 36-47. IEEE, (2023)Integer Syndrome Decoding in the Presence of Noise., , , and . ITW, page 482-487. IEEE, (2022)Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?, , , , and . IACR Cryptol. ePrint Arch., (2021)A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial., , , , , , , and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 105-125. Springer, (2023)Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece., , , and . COSADE, volume 13979 of Lecture Notes in Computer Science, page 170-192. Springer, (2023)Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem., , , and . IACR Cryptol. ePrint Arch., (2022)