Author of the publication

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android.

, , , and . WISEC, page 49-60. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handling the NDEF signature record type in a secure manner., and . RFID-TA, page 107-112. IEEE, (2012)SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 547-572 (2018)Side-Channel Analysis of Keymill., , , and . COSADE, volume 10348 of Lecture Notes in Computer Science, page 138-152. Springer, (2017)Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC., , , and . COSADE, volume 9064 of Lecture Notes in Computer Science, page 222-236. Springer, (2015)Leakage Bounds for Gaussian Side Channels., , , , , , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 88-104. Springer, (2017)Practical Fault Attacks on Authenticated Encryption Modes for AES., , , , and . IACR Cryptology ePrint Archive, (2016)Investigation of Parameters Influencing the Success of Optical Fault Attacks.. FPS, volume 8352 of Lecture Notes in Computer Science, page 140-157. Springer, (2013)On the power of active relay attacks using custom-made proxies., and . IEEE RFID, page 126-133. IEEE, (2014)Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness., , , and . IEEE Trans. Inf. Forensics Secur., 10 (2): 266-277 (2015)Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order., , and . TIS@CCS, page 3. ACM, (2016)