Author of the publication

FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices.

, , , and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 289-309. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Plundervolt: Software-based Fault Injection Attacks against Intel SGX., , , , , and . SP, page 1466-1482. IEEE, (2020)PMFault: Faulting and Bricking Server CPUs through Management Interfaces., and . CoRR, (2023)Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (1): 56-81 (2021)Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU., , , and . CARDIS, volume 13820 of Lecture Notes in Computer Science, page 227-247. Springer, (2022)PLATYPUS: Software-based Power Side-Channel Attacks on x86., , , , , , and . SP, page 355-371. IEEE, (2021)A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes., , , , , and . CCS, page 1741-1758. ACM, (2019)Attacking Embedded ECC Implementations Through cmov Side Channels., , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 99-119. Springer, (2016)Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber., , , , , and . IEEE Trans. Computers, 71 (9): 2163-2176 (2022)Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber., , , and . IACR Cryptol. ePrint Arch., (2020)PMFault: Faulting and Bricking Server CPUs through Management Interfaces Or: A Modern Example of Halt and Catch Fire., and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (2): 1-23 (2023)