Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dude, is my code constant time?, , and . IACR Cryptology ePrint Archive, (2016)A Masked Ring-LWE Implementation., , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 683-702. Springer, (2015)Additively Homomorphic Ring-LWE Masking., , , , and . PQCrypto, volume 9606 of Lecture Notes in Computer Science, page 233-244. Springer, (2016)Dude, is my code constant time?, , and . DATE, page 1697-1702. IEEE, (2017)Consolidating Security Notions in Hardware Masking., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (3): 119-147 (2019)Four$Q$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 536-549 (2020)Masking ring-LWE., , , , and . J. Cryptographic Engineering, 6 (2): 139-153 (2016)Detecting Flawed Masking Schemes with Leakage Detection Tests.. FSE, volume 9783 of Lecture Notes in Computer Science, page 204-222. Springer, (2016)Compact and Side Channel Secure Discrete Gaussian Sampling., , , and . IACR Cryptology ePrint Archive, (2014)Fast Leakage Assessment., , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 387-399. Springer, (2017)