Author of the publication

Wait a Minute! A fast, Cross-VM Attack on AES.

, , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 299-319. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving NTRU with Montgomery Multiplication., and . IEEE Trans. Computers, 52 (4): 440-448 (2003)Fully Homomorphic Encryption from the Finite Field Isomorphism Problem., , , , , , and . IACR Cryptology ePrint Archive, (2017)Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography., and . FDTC, volume 4236 of Lecture Notes in Computer Science, page 196-210. Springer, (2006)A tamper-proof and lightweight authentication scheme., , and . Pervasive Mob. Comput., 4 (6): 807-818 (2008)QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme., , and . ACM Conference on Computer and Communications Security, page 1071-1084. ACM, (2020)A fast real-time memory authentication protocol., , and . STC, page 31-40. ACM, (2008)Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes., , , and . Fault Analysis in Cryptography, Springer, (2012)Tate Pairing with Strong Fault Resiliency., , and . FDTC, page 103-111. IEEE Computer Society, (2007)Transparent code authentication at the processor level., , , , and . IET Comput. Digit. Tech., 3 (4): 354-372 (2009)MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations., , , and . Int. J. Parallel Program., 47 (4): 538-570 (2019)