Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory Tampering Attack on Binary GCD Based Inversion Algorithms., , , and . Int. J. Parallel Program., 47 (4): 621-640 (2019)Implementing Cryptography for Packet Level Authentication.. Security and Management, page 475-480. CSREA Press, (2008)HyperDegrade: From GHz to MHz Effective CPU Frequencies., and . USENIX Security Symposium, page 2801-2818. USENIX Association, (2022)Certified Side Channels., , , , , and . USENIX Security Symposium, page 2021-2038. USENIX Association, (2020)Bit-Sliced Binary Normal Basis Multiplication., and . IEEE Symposium on Computer Arithmetic, page 205-212. IEEE Computer Society, (2011)SoK: Remote Power Analysis., , and . ARES, page 7:1-7:12. ACM, (2021)Conversion Algorithms and Implementations for Koblitz Curve Cryptography., and . IEEE Trans. Computers, 59 (1): 81-92 (2010)New Results on Instruction Cache Attacks., , and . CHES, volume 6225 of Lecture Notes in Computer Science, page 110-124. Springer, (2010)Secure and Fast Implementations of Two Involution Ciphers.. NordSec, volume 7127 of Lecture Notes in Computer Science, page 269-282. Springer, (2010)Batch Binary Weierstrass., , , , and . LATINCRYPT, volume 11774 of Lecture Notes in Computer Science, page 364-384. Springer, (2019)