Author of the publication

Enhancing Dimensionality Reduction Methods for Side-Channel Attacks.

, , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 15-33. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices., , and . CARDIS, volume 5189 of Lecture Notes in Computer Science, page 191-205. Springer, (2008)Montgomery's Trick and Fast Implementation of Masked AES., , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 153-169. Springer, (2011)Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations., , , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 1-17. Springer, (2013)Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform., , , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 1-14. Springer, (2008)Side-Channel Analysis of Montgomery's Representation Randomization., , and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 212-227. Springer, (2014)Masking against Side-Channel Attacks: A Formal Security Proof., and . EUROCRYPT, volume 7881 of Lecture Notes in Computer Science, page 142-159. Springer, (2013)Higher-Order Masking Schemes for S-Boxes., , , , and . FSE, volume 7549 of Lecture Notes in Computer Science, page 366-384. Springer, (2012)Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations., , and . WISTP, volume 12024 of Lecture Notes in Computer Science, page 66-84. Springer, (2019)Securing AES Implementation against Fault Attacks., , and . FDTC, page 51-62. IEEE Computer Society, (2009)Kernel Discriminant Analysis for Information Extraction in the Presence of Masking., , and . CARDIS, volume 10146 of Lecture Notes in Computer Science, page 1-22. Springer, (2016)