Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-Latency and Low-Randomness Second-Order Masked Cubic Functions., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (1): 113-152 (2023)Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency., , , and . IACR Cryptol. ePrint Arch., (2021)First-Order Hardware Sharings of the AES., , and . IACR Cryptol. ePrint Arch., (2021)StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations., , and . IACR Cryptol. ePrint Arch., (2023)Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols., , , , and . IACR Trans. Symmetric Cryptol., 2020 (3): 1-45 (2020)MARVELlous: a STARK-Friendly Family of Cryptographic Primitives., and . IACR Cryptology ePrint Archive, (2018)StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (1): 229-263 (2024)An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes., , , , , , , and . IACR Cryptol. ePrint Arch., (2022)An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes., , , , , , , and . IEEE Trans. Inf. Theory, 69 (10): 6700-6710 (October 2023)Threshold Implementations with Non-uniform Inputs., and . SAC, volume 14201 of Lecture Notes in Computer Science, page 97-123. Springer, (2023)