Author of the publication

Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography.

, , and . VLSI-SoC, page 1-2. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC., , , , and . DSP, page 1-5. IEEE, (2018)On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4., , , and . SPACE, volume 12586 of Lecture Notes in Computer Science, page 123-146. Springer, (2020)Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software., , and . IACR Cryptol. ePrint Arch., (2023)Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond., , , , and . IACR Cryptol. ePrint Arch., (2022)STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber., , , , and . IACR Cryptol. ePrint Arch., (2023)Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results., , , and . ACM Trans. Embed. Comput. Syst., 23 (2): 35:1-35:54 (March 2024)Formal Verification of Secure Boot Process., , , , and . DATE, page 1-6. IEEE, (2024)Number "Not Used" Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates., , , , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 232-250. Springer, (2019)Security is an architectural design constraint., , , , , and . Microprocess. Microsystems, (2019)Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates., , , , and . IACR Cryptol. ePrint Arch., (2019)