From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations., , , , , , , , , и . IACR Cryptol. ePrint Arch., (2022)The Side-Channel Metric Cheat Sheet., , , , , и . IACR Cryptol. ePrint Arch., (2022)Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?, , , , и . IACR Cryptol. ePrint Arch., (2021)Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?, , , и . IACR Cryptol. ePrint Arch., (2019)Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium., , , , и . IACR Cryptol. ePrint Arch., (2023)Blind Side-Channel SIFA., , и . DATE, стр. 555-560. IEEE, (2021)The Side-channel Metrics Cheat Sheet., , , , , и . ACM Comput. Surv., 55 (10): 216:1-216:38 (2023)Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?, , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (2): 140-165 (2022)A Systematic Appraisal of Side Channel Evaluation Strategies., , , , , , , , , и 1 other автор(ы). SSR, том 12529 из Lecture Notes in Computer Science, стр. 46-66. Springer, (2020)On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices., , , , , и . INDOCRYPT, том 12578 из Lecture Notes in Computer Science, стр. 205-227. Springer, (2020)