Author of the publication

Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts.

, and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 235-245. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation., , and . IEEE Access, (2022)Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack., and . IACR Cryptology ePrint Archive, (2019)An improved side channel attack using event information of subtraction., , , and . J. Netw. Comput. Appl., (2014)Key Bit-Dependent Attack on Protected PKC Using a Single Trace., and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 168-185. Springer, (2017)A Study on the SCA Trends for Application to IoT Devices., and . J. Internet Serv. Inf. Secur., 10 (1): 2-21 (2020)Efficient key detection method in the correlation electromagnetic analysis using peak selection algorithm., , , , and . J. Commun. Networks, 11 (6): 556-563 (2009)A new bit-serial multiplier over GF(pm) using irreducible trinomials., , , , and . Comput. Math. Appl., 60 (2): 355-361 (2010)Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT., , , and . ICCST, page 1-5. IEEE, (2011)Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction., , and . IACR Cryptol. ePrint Arch., (2021)Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure., , , , and . ICISC (1), volume 14561 of Lecture Notes in Computer Science, page 185-201. Springer, (2023)