Author of the publication

Attack on AES Implementation Exploiting Publicly-visible Partial Result.

. IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault Intensity Map Analysis with Neural Network Key Distinguisher., , and . ASHES@CCS, page 33-42. ACM, (2019)FIMA: Fault Intensity Map Analysis., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 63-79. Springer, (2019)Minerva: Automated hardware optimization tool., , , and . ReConFig, page 1-8. IEEE, (2017)RTL implementations and FPGA benchmarking of selected CAESAR Round Two authenticated ciphers., and . Microprocess. Microsystems, (2017)Attack on AES Implementation Exploiting Publicly-visible Partial Result.. IACR Cryptology ePrint Archive, (2017)A universal hardware API for authenticated ciphers., , , , , and . ReConFig, page 1-8. IEEE, (2015)High-Speed RTL Implementations and FPGA Benchmarking of Three Authenticated Ciphers Competing in CAESAR Round Two., and . FCCM, page 93. IEEE Computer Society, (2016)Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)GMU Hardware API for Authenticated Ciphers., , , , , and . IACR Cryptology ePrint Archive, (2015)Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon., , , , and . IACR Cryptology ePrint Archive, (2019)