Author of the publication

Implementation of a Boolean Masking Scheme for the SCREAM Cipher.

, and . DSD, page 723-726. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack on AES Implementation Exploiting Publicly-visible Partial Result.. IACR Cryptology ePrint Archive, (2017)FIMA: Fault Intensity Map Analysis., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 63-79. Springer, (2019)Fault Intensity Map Analysis with Neural Network Key Distinguisher., , and . ASHES@CCS, page 33-42. ACM, (2019)RTL implementations and FPGA benchmarking of selected CAESAR Round Two authenticated ciphers., and . Microprocess. Microsystems, (2017)A universal hardware API for authenticated ciphers., , , , , and . ReConFig, page 1-8. IEEE, (2015)Minerva: Automated hardware optimization tool., , , and . ReConFig, page 1-8. IEEE, (2017)High-Speed RTL Implementations and FPGA Benchmarking of Three Authenticated Ciphers Competing in CAESAR Round Two., and . FCCM, page 93. IEEE Computer Society, (2016)A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography., , , , , and . IACR Cryptology ePrint Archive, (2019)Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon., , , , and . IACR Cryptology ePrint Archive, (2019)