Author of the publication

When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors.

, , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (4): 1-24 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations., , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (4): 58-79 (2023)Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (3): 390-417 (2021)POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption., , , , and . Public Key Cryptography (1), volume 13940 of Lecture Notes in Computer Science, page 114-144. Springer, (2023)Siamese Network for Salivary Glands Segmentation., , , , , , and . KES-IDT, volume 309 of Smart Innovation, Systems and Technologies, page 449-457. Springer, (2022)Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher., , , and . ASIACRYPT (3), volume 13793 of Lecture Notes in Computer Science, page 32-67. Springer, (2022)Fusion of images and clinical features for the prediction of Pulmonary embolism in Ultrasound imaging., , , , and . SSP, page 423-427. IEEE, (2023)Learning with Physical Rounding for Linear and Quadratic Leakage Functions., , , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 410-439. Springer, (2023)The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm., , and . INDOCRYPT (1), volume 14459 of Lecture Notes in Computer Science, page 134-156. Springer, (2023)Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption., , , , and . IACR Cryptol. ePrint Arch., (2022)Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber., , , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 236-256. Springer, (2022)