Author of the publication

Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber.

, , , and . IACR Cryptol. ePrint Arch., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating single-event upsets in COTS SDRAM using an EDAC SDRAM controller., , and . NORCAS, page 1-6. IEEE, (2017)Implementation of a fault-tolerant, globally-asynchronous-locally-synchronous, inter-chip NoC communication bridge on FPGAs., , and . NORCAS, page 1-6. IEEE, (2017)Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber., , , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 159-177. Springer, (2023)A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations., , and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 450-471. Springer, (2022)A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber., , , and . IACR Cryptol. ePrint Arch., (2023)Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste., , , and . APKC@AsiaCCS, page 10-20. ACM, (2023)Bitstream Modification of Trivium., , and . IACR Cryptol. ePrint Arch., (2020)Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste., , and . IACR Cryptol. ePrint Arch., (2022)A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 676-707 (2021)Attacking Trivium at the Bitstream Level., , and . ICCD, page 640-647. IEEE, (2020)