Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Side-Channel Metric Cheat Sheet., , , , , and . IACR Cryptol. ePrint Arch., (2022)Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?, , , , and . IACR Cryptol. ePrint Arch., (2021)Blind Side-Channel SIFA., , and . DATE, page 555-560. IEEE, (2021)The Side-channel Metrics Cheat Sheet., , , , , and . ACM Comput. Surv., 55 (10): 216:1-216:38 (2023)A Systematic Appraisal of Side Channel Evaluation Strategies., , , , , , , , , and 1 other author(s). SSR, volume 12529 of Lecture Notes in Computer Science, page 46-66. Springer, (2020)On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices., , , , , and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 205-227. Springer, (2020)Shortcut side-channel security evaluations: application to elliptic curve cryptography, masking and shuffling.. Catholic University of Louvain, Louvain-la-Neuve, Belgium, (2021)base-search.net (ftunivlouvain:oai:dial.uclouvain.be:boreal:254418).Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber., , , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 236-256. Springer, (2022)Fast Side-Channel Security Evaluation of ECC Implementations - Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 25-42. Springer, (2019)Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations., , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (4): 58-79 (2023)