Author of the publication

Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools.

, and . CHES, volume 10529 of Lecture Notes in Computer Science, page 367-386. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits., and . CARDIS, volume 8968 of Lecture Notes in Computer Science, page 85-103. Springer, (2014)Security from Disjoint Paths: Is It Possible? (Transcript of Discussion).. Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 254-259. Springer, (2017)Tight and Scalable Side-Channel Attack Evaluations through Asymptotically Optimal Massey-like Inequalities on Guessing Entropy., , , and . Entropy, 23 (11): 1538 (2021)Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools., and . CHES, volume 10529 of Lecture Notes in Computer Science, page 367-386. Springer, (2017)