Author of the publication

Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.

, , and . EUROCRYPT (1), volume 9056 of Lecture Notes in Computer Science, page 401-429. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption., , , and . IACR Cryptology ePrint Archive, (2013)On the Security of the DeKaRT Primitive., , , and . CARDIS, volume 153 of IFIP, page 241-254. Kluwer/Springer, (2004)Scaling Trends of the AES S-box Low Power Consumption in 130 and 65 nm CMOS Technology Nodes., , and . ISCAS, page 1385-1388. IEEE, (2009)A first step towards automatic application of power analysis countermeasures., , , , and . DAC, page 230-235. ACM, (2011)Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher., , and . IACR Cryptology ePrint Archive, (2019)Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF., , , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 602-623. (2016)How Leaky Is an Extractor?. LATINCRYPT, volume 6212 of Lecture Notes in Computer Science, page 294-304. Springer, (2010)ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware., , , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 279-299. Springer, (2004)A Statistical Saturation Attack against the Block Cipher PRESENT., and . CT-RSA, volume 5473 of Lecture Notes in Computer Science, page 195-210. Springer, (2009)Towards Easy Leakage Certification., , and . CHES, volume 9813 of Lecture Notes in Computer Science, page 40-60. Springer, (2016)