Author of the publication

Optimal Recovery of Secret Keys from Weak Side Channel Traces.

, and . IMACC, volume 5921 of Lecture Notes in Computer Science, page 446-468. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Randomized Exponentiation Algorithms.. Cryptographic Engineering, Springer, (2009)The Montgomery and Joye Powering Ladders are Dual.. IACR Cryptology ePrint Archive, (2017)Modular Arithmetic., , and . Encyclopedia of Cryptography and Security, Springer, (2005)Optimal parameters for on-line arithmetic.. Int. J. Comput. Math., 56 (1-2): 11-18 (1995)Montgomery's Multiplication Technique: How to Make It Smaller and Faster.. CHES, volume 1717 of Lecture Notes in Computer Science, page 80-93. Springer, (1999)Seeing through MIST Given a Small Fraction of an RSA Private Key.. CT-RSA, volume 2612 of Lecture Notes in Computer Science, page 391-402. Springer, (2003)Issues of Security with the Oswald-Aigner Exponentiation Algorithm.. CT-RSA, volume 2964 of Lecture Notes in Computer Science, page 208-221. Springer, (2004)Data Integrity in Hardware for Modular Arithmetic.. CHES, volume 1965 of Lecture Notes in Computer Science, page 204-215. Springer, (2000)Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones.. WISA, volume 4867 of Lecture Notes in Computer Science, page 303-316. Springer, (2007)Systolic Modular Multiplication.. IEEE Trans. Computers, 42 (3): 376-378 (1993)