Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probing Security through Input-Output Separation and Revisited Quasilinear Masking., , , and . IACR Cryptol. ePrint Arch., (2022)OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element., , , and . IACR Cryptol. ePrint Arch., (2024)Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform., , , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 1-14. Springer, (2008)On Double Exponentiation for Securing RSA against Fault Analysis., , and . CT-RSA, volume 8366 of Lecture Notes in Computer Science, page 152-168. Springer, (2014)Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations., and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (2): 225-255 (2019)Differential Fault Analysis of DES.. Fault Analysis in Cryptography, Springer, (2012)Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments., and . IACR Cryptol. ePrint Arch., (2023)Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head., and . IACR Cryptol. ePrint Arch., (2022)Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation., , , , , , and . IACR Trans. Symmetric Cryptol., 2020 (S1): 31-59 (2020)Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head., and . ASIACRYPT (1), volume 14438 of Lecture Notes in Computer Science, page 441-473. Springer, (2023)