Author of the publication

A Fault Resistant AES via Input-Output Differential Tables with DPA Awareness.

, , and . ISCAS, page 1-5. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Serialized lightweight SHA-3 FPGA implementations., and . Microprocess. Microsystems, (2019)Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (3): 221-245 (2023)Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations., , , , , and . COSADE, volume 14595 of Lecture Notes in Computer Science, page 133-154. Springer, (2024)Verified Value Chains, Innovation and Competition., , , , , , , , , and 3 other author(s). CSR, page 470-476. IEEE, (2023)A Fault Resistant AES via Input-Output Differential Tables with DPA Awareness., , and . ISCAS, page 1-5. IEEE, (2021)Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks., , , , and . FDTC, page 57-65. IEEE, (2020)Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE., , , and . IACR Cryptol. ePrint Arch., (2022)Cyber Threat Observatory: Design and Evaluation of an Interactive Dashboard for Computer Emergency Response Teams., , , , and . ECIS, (2022)Voronoi Based Multidimensional Parameter Optimization for Fault Injection Attacks., and . FDTC, page 13-23. IEEE, (2023)Post-Quantum Secure Architectures for Automotive Hardware Secure Modules., and . IACR Cryptology ePrint Archive, (2020)