Author of the publication

On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC.

, , and . CT-RSA, volume 2020 of Lecture Notes in Computer Science, page 208-222. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How can we overcome both side channel analysis and fault attacks on RSA-CRT?, and . FDTC, page 21-29. IEEE Computer Society, (2007)FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications., , , , and . CARDIS, (1996)New identity based signcryption schemes from pairings., and . IACR Cryptology ePrint Archive, (2003)A Flexible Hardware JPEG 2000 Decoder for Digital Cinema., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 16 (11): 1397-1410 (2006)Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences., and . J. Comput. Secur., 5 (3): 213-224 (1997)Compact elliptic curve representations., , and . J. Math. Cryptol., 5 (1): 89-100 (2011)Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery"., , , , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 465-473. Springer, (1990)Analytical Characteristics of the DES., , , , , , , , , and . CRYPTO, page 171-202. Plenum Press, New York, (1983)Electromagnetic Attack., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Better Login Protocols for Computer Networks., and . Computer Security and Industrial Cryptography, volume 741 of Lecture Notes in Computer Science, page 50-70. Springer, (1991)