Author of the publication

Revealing side-channel issues of complex circuits by enhanced leakage models.

, , and . DATE, page 1179-1184. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Should an Implementation Attack Be Viewed as Successful?. Number Theory and Cryptography, volume 8260 of Lecture Notes in Computer Science, page 139-150. Springer, (2013)On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure., and . SCN, volume 2576 of Lecture Notes in Computer Science, page 133-145. Springer, (2002)A New Side-Channel Attack on RSA Prime Generation., , and . CHES, volume 5747 of Lecture Notes in Computer Science, page 141-155. Springer, (2009)Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications., and . CHES, volume 2523 of Lecture Notes in Computer Science, page 431-449. Springer, (2002)More Detail for a Combined Timing and Power Attack against Implementations of RSA., and . IMACC, volume 2898 of Lecture Notes in Computer Science, page 245-263. Springer, (2003)Optimal Recovery of Secret Keys from Weak Side Channel Traces., and . IMACC, volume 5921 of Lecture Notes in Computer Science, page 446-468. Springer, (2009)Timing attacks and local timing attacks against Barrett's modular multiplication algorithm., and . J. Cryptogr. Eng., 11 (4): 369-397 (2021)Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies., , and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 245-267. Springer, (2001)Equivariant Mappings: a New Approach in Stochastic Simulations.. Comput. Geom., (1994)Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods., , and . J. Math. Cryptol., 15 (1): 408-433 (2021)