Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minerva: The curse of ECDSA nonces., , , and . IACR Cryptol. ePrint Arch., (2020)Attack Detection vs. Privacy - How to Find the Link or How to Hide It?, , , and . Security Protocols Workshop, volume 7114 of Lecture Notes in Computer Science, page 189-199. Springer, (2011)Reconsidering Attacker Models in Ad-Hoc Networks., , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 219-227. Springer, (2016)Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion).. Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 228-231. Springer, (2016)Smart Dust Security - Key Infection Revisited., and . STM, volume 157 of Electronic Notes in Theoretical Computer Science, page 11-25. Elsevier, (2005)Towards Cryptographic Function Distinguishers with Evolutionary Circuits., , and . SECRYPT, page 135-146. SciTePress, (2013)Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions., , , , and . SECRYPT, page 134-146. SCITEPRESS, (2022)Two Improvements of Random Key Predistribution for Wireless Sensor Networks., , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 61-75. Springer, (2012)JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets., and . EuroS&P Workshops, page 89-96. IEEE, (2020)On the Origin of Yet another Channel (Transcript of Discussion).. Security Protocols Workshop, volume 8263 of Lecture Notes in Computer Science, page 238-244. Springer, (2013)