Author of the publication

Selecting Time Samples for Multivariate DPA Attacks.

, , and . CHES, volume 7428 of Lecture Notes in Computer Science, page 155-174. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Four$Q$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 536-549 (2020)Consolidating Security Notions in Hardware Masking., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (3): 119-147 (2019)Dude, is my code constant time?, , and . DATE, page 1697-1702. IEEE, (2017)A Masked Ring-LWE Implementation., , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 683-702. Springer, (2015)Dude, is my code constant time?, , and . IACR Cryptology ePrint Archive, (2016)Additively Homomorphic Ring-LWE Masking., , , , and . PQCrypto, volume 9606 of Lecture Notes in Computer Science, page 233-244. Springer, (2016)Detecting Flawed Masking Schemes with Leakage Detection Tests.. FSE, volume 9783 of Lecture Notes in Computer Science, page 204-222. Springer, (2016)Masking ring-LWE., , , , and . J. Cryptographic Engineering, 6 (2): 139-153 (2016)DPA, Bitslicing and Masking at 1 GHz., , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 599-619. Springer, (2015)Fast Leakage Assessment., , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 387-399. Springer, (2017)