Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear Bandwidth Naccache-Stern Encryption., , and . SCN, volume 5229 of Lecture Notes in Computer Science, page 327-339. Springer, (2008)When Hashes Collide., , and . IEEE Secur. Priv., 3 (3): 68-71 (2005)Experimenting with Faults, Lattices and the DSA., , , and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 16-28. Springer, (2005)Mixed-radix Naccache-Stern encryption., and . J. Cryptogr. Eng., 9 (3): 277-282 (2019)Arithmetic co-processors for public-key cryptography: The state of the art., and . CARDIS, (1996)Divisibility, Smoothness and Cryptographic Applications., and . Algebraic Aspects of Digital Communications, volume 24 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)Another Look at RSA Signatures With Affine Padding., , and . IACR Cryptology ePrint Archive, (2011)Fault Attacks Against EMV Signatures., , and . IACR Cryptology ePrint Archive, (2009)Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications., , and . Des. Codes Cryptogr., 5 (1): 73-80 (1995)Fault Attacks Against emv Signatures., , and . CT-RSA, volume 5985 of Lecture Notes in Computer Science, page 208-220. Springer, (2010)