Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selective Exchange of Confidential Data in the Outsourcing Scenario., , , , and . Privacy and Identity Management for Life, Springer, (2011)Supporting concurrency and multiple indexes in private access to outsourced data., , , , and . Journal of Computer Security, 21 (3): 425-461 (2013)Access Control for the Shuffle Index., , , , and . DBSec, volume 9766 of Lecture Notes in Computer Science, page 130-147. Springer, (2016)Countermeasures for the Simple Branch Prediction Analysis., and . IACR Cryptology ePrint Archive, (2006)Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks., , and . IACR Cryptology ePrint Archive, (2014)A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications., , , , and . IACR Cryptology ePrint Archive, (2019)Secure Index.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Securing software cryptographic primitives for embedded systems against side channel attacks., , and . ICCST, page 1-6. IEEE, (2014)Automated instantiation of side-channel attacks countermeasures for software cipher implementations., , and . Conf. Computing Frontiers, page 455-460. ACM, (2016)Distributed Shuffling for Preserving Access Confidentiality., , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 628-645. Springer, (2013)