Author of the publication

SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision.

, , , , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 475-493. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols., , , , and . IACR Trans. Symmetric Cryptol., 2020 (3): 1-45 (2020)Low-Latency and Low-Randomness Second-Order Masked Cubic Functions., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (1): 113-152 (2023)First-Order Hardware Sharings of the AES., , and . IACR Cryptol. ePrint Arch., (2021)Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency., , , and . IACR Cryptol. ePrint Arch., (2021)StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations., , and . IACR Cryptol. ePrint Arch., (2023)MARVELlous: a STARK-Friendly Family of Cryptographic Primitives., and . IACR Cryptology ePrint Archive, (2018)An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes., , , , , , , and . IEEE Trans. Inf. Theory, 69 (10): 6700-6710 (October 2023)StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (1): 229-263 (2024)An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes., , , , , , , and . IACR Cryptol. ePrint Arch., (2022)Guarding the First Order: The Rise of AES Maskings., , , , and . CARDIS, volume 13820 of Lecture Notes in Computer Science, page 103-122. Springer, (2022)