Author of the publication

On the Computational Hardness of the Code Equivalence Problem in Cryptography.

, , , and . IACR Cryptol. ePrint Arch., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks., , and . IACR Cryptology ePrint Archive, (2014)ShieldFS: a self-healing, ransomware-aware filesystem., , , , , , and . ACSAC, page 336-347. ACM, (2016)Securing software cryptographic primitives for embedded systems against side channel attacks., , and . ICCST, page 1-6. IEEE, (2014)Automated instantiation of side-channel attacks countermeasures for software cipher implementations., , and . Conf. Computing Frontiers, page 455-460. ACM, (2016)Systematic parsing of X.509: Eradicating security issues with a parse tree., , and . Journal of Computer Security, 26 (6): 817-849 (2018)A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications., , , , and . IACR Cryptology ePrint Archive, (2019)Locating Side Channel Leakage in Time through Matched Filters., , and . Cryptogr., 6 (2): 26 (2022)OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives., , , and . Concurr. Comput. Pract. Exp., 27 (14): 3633-3660 (2015)Exploring Cortex-M Microarchitectural Side Channel Information Leakage., , , and . IEEE Access, (2021)On the Computational Hardness of the Code Equivalence Problem in Cryptography., , , and . IACR Cryptol. ePrint Arch., (2022)