Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings., , , , , , and . COSADE, volume 13979 of Lecture Notes in Computer Science, page 86-104. Springer, (2023)Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations., , , , , , and . ITW, page 81-86. IEEE, (2023)Fast algorithms for the continuous wavelet transform.. ICASSP, page 2213-2216. IEEE Computer Society, (1991)Bent Sequences over Hadamard Codes for Physically Unclonable Functions., , , and . ISIT, page 801-806. IEEE, (2021)Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy., , , , and . ISIT, page 654-659. IEEE, (2023)At Every Corner: Determining Corner Points of Two-User Gaussian Interference Channels.. CoRR, (2016)On some almost properties., and . ITA, page 1-5. IEEE, (2016)On the entropy of Physically Unclonable Functions., , , and . ISIT, page 2928-2932. IEEE, (2016)BIGnav: Bayesian Information Gain for Guiding Multiscale Navigation., , , and . CHI, page 5869-5880. ACM, (2017)Be My Guesses: The interplay between side-channel leakage metrics., , , and . Microprocess. Microsystems, (2024)