Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks., , and . COSADE, volume 9064 of Lecture Notes in Computer Science, page 51-63. Springer, (2015)A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework., and . CRYPTO, volume 6841 of Lecture Notes in Computer Science, page 316-334. Springer, (2011)Categorising and Comparing Cluster-Based DPA Distinguishers., , , , and . SAC, volume 10719 of Lecture Notes in Computer Science, page 442-458. Springer, (2017)A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher., , , , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 70-87. Springer, (2017)Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages., , and . USENIX Security Symposium, page 199-216. USENIX Association, (2017)Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use., , , , , , , , and . STAST, page 5:1-5:6. ACM, (2018)Robust Profiling for DPA-Style Attacks., and . CHES, volume 9293 of Lecture Notes in Computer Science, page 3-21. Springer, (2015)Masking Tables - An Underestimated Security Risk., , and . FSE, volume 8424 of Lecture Notes in Computer Science, page 425-444. Springer, (2013)The Myth of Generic DPA...and the Magic of Learning., , and . CT-RSA, volume 8366 of Lecture Notes in Computer Science, page 183-205. Springer, (2014)A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules')., and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 256-284. Springer, (2019)