Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3., , , and . COSADE, volume 8622 of Lecture Notes in Computer Science, page 129-143. Springer, (2014)Montgomery's Trick and Fast Implementation of Masked AES., , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 153-169. Springer, (2011)Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings., , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 240-255. Springer, (2011)Securing AES Implementation against Fault Attacks., , and . FDTC, page 51-62. IEEE Computer Society, (2009)Secure Multiplicative Masking of Power Functions., , and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 200-217. (2010)