Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance.. COSADE, volume 8622 of Lecture Notes in Computer Science, page 56-68. Springer, (2014)Fault Attacks on a Cloud-Assisted ECDSA White-Box Based on the Residue Number System., and . FDTC, page 72-80. IEEE, (2023)White-Box ECDSA: Challenges and Existing Solutions., , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 184-201. Springer, (2021)Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform., , , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 1-14. Springer, (2008)Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm., , , , and . FDTC, page 89-96. IEEE Computer Society, (2010)A Unified Approach to Fair Online Learning via Blackwell Approachability., , and . NeurIPS, page 18280-18292. (2021)Transient Fault Induction Attacks on XTR., and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 440-451. Springer, (2004)DFA on AES.. AES Conference, volume 3373 of Lecture Notes in Computer Science, page 27-41. Springer, (2004)Enhanced Security Architecture for Music Distribution on Mobile., , , , and . ESORICS, volume 4189 of Lecture Notes in Computer Science, page 97-109. Springer, (2006)Improved Fault Analysis of Signature Schemes., , and . CARDIS, volume 6035 of Lecture Notes in Computer Science, page 164-181. Springer, (2010)