Author of the publication

A Tolerant Algebraic Side-Channel Attack on AES Using CP.

, , , , and . CP, volume 10416 of Lecture Notes in Computer Science, page 189-205. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques., , , , , and . FDTC, page 41-51. IEEE Computer Society, (2013)Influence of Error on Hamming Weights for ASCA., , , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 447-460. Springer, (2017)A Tolerant Algebraic Side-Channel Attack on AES Using CP., , , , and . CP, volume 10416 of Lecture Notes in Computer Science, page 189-205. Springer, (2017)Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering., , , , , , and . FDTC, page 29-39. IEEE Computer Society, (2014)CARAF: Crypto Agility Risk Assessment Framework., , , , and . J. Cybersecur., (2021)Error Tolerant ASCA on FPGA., and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 563-572. Springer, (2018)