Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security, Cryptography: Theory and Practice. (Sécurité, Cryptographie : Théorie et Pratique).. (2004)Electrically conductive adhesives, thermally conductive adhesives and UV adhesives in data extraction forensics., , and . Digital Investigation, (2017)Secure and Practical Identity-Based Encryption. CoRR, (2005)Chemical Combinatorial Attacks on Keyboards., , and . IACR Cryptology ePrint Archive, (2003)Thermocommunication., , , , and . IACR Cryptology ePrint Archive, (2009)How to Explain Side-Channel Leakage to Your Kids., and . CHES, volume 1965 of Lecture Notes in Computer Science, page 229-230. Springer, (2000)Cryptographically secure shields., , , , , , and . HOST, page 25-31. IEEE Computer Society, (2014)New Number-Theoretic Cryptographic Primitives., , , and . IACR Cryptology ePrint Archive, (2019)Robust Encryption, Extended., , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 149-168. Springer, (2019)Universal Padding Schemes for RSA., , , and . CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 226-241. Springer, (2002)