Author of the publication

A Note on the Security of CHES 2014 Symmetric Infective Countermeasure.

, and . COSADE, volume 9689 of Lecture Notes in Computer Science, page 144-159. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Training Integrable Parameterizations of Deep Neural Networks in the Infinite-Width Limit., , and . CoRR, (2021)On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance.. COSADE, volume 8622 of Lecture Notes in Computer Science, page 56-68. Springer, (2014)Pair Matching: When bandits meet stochastic block model., , , and . CoRR, (2019)On the convex hull of a Brownian excursion with parabolic drift. Stochastic Processes and their Applications, 106 (1): 41--62 (July 2003)On Second-Order Fault Analysis Resistance for CRT-RSA Implementations., , , and . WISTP, volume 5746 of Lecture Notes in Computer Science, page 68-83. Springer, (2009)ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest., , , , , , , , and . IACR Cryptol. ePrint Arch., (2022)ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge., , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (4): 527-552 (2022)A Systematic Appraisal of Side Channel Evaluation Strategies., , , , , , , , , and 1 other author(s). SSR, volume 12529 of Lecture Notes in Computer Science, page 46-66. Springer, (2020)Provably Secure S-Box Implementation Based on Fourier Transform., , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 216-230. Springer, (2006)Estimating the history of a random recursive tree., , , and . CoRR, (2024)