Author of the publication

On Second-Order Differential Power Analysis.

, , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 293-308. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Reveal the Secrets of an Obscure White-Box Implementation., , , and . IACR Cryptology ePrint Archive, (2018)On Second-Order Differential Power Analysis., , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 293-308. Springer, (2005)Universally Convertible Directed Signatures., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 682-701. Springer, (2005)A Trapdoor Permutation Equivalent to Factoring.. Public Key Cryptography, volume 1560 of Lecture Notes in Computer Science, page 219-222. Springer, (1999)Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 1-20. Springer, (2005)SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications., , , and . Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, page 107-122. Springer, (2010)GCD-Free Algorithms for Computing Modular Inverses., and . CHES, volume 2779 of Lecture Notes in Computer Science, page 243-253. Springer, (2003)Probing Attacks on Tamper-Resistant Devices., , and . CHES, volume 1717 of Lecture Notes in Computer Science, page 303-315. Springer, (1999)How to Disembed a Program?, , , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 441-454. Springer, (2004)GEM: A Generic Chosen-Ciphertext Secure Encryption Method., , , , , and . CT-RSA, volume 2271 of Lecture Notes in Computer Science, page 263-276. Springer, (2002)