Author of the publication

Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography.

, , , , and . J. Cryptogr. Eng., 14 (1): 1-18 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel algorithms for slicing based final placement, , and . Forschungsberichte, TU Munich, (1992)A Calibratable Detector for Invasive Attacks., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (5): 1067-1079 (2019)Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track., , , , and . CoRR, (2023)Counteract Side-Channel Analysis of Neural Networks by Shuffling., , and . DATE, page 1305-1310. IEEE, (2022)A Second Look at the ASCAD Databases., , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 75-99. Springer, (2022)A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts., , , and . ICCAD, page 69:1-69:9. ACM, (2022)Efficient Hardware/Software Co-Design for Post-Quantum Crypto Algorithm SIKE on ARM and RISC-V based Microcontrollers., , and . ICCAD, page 35:1-35:9. IEEE, (2020)Review of error correction for PUFs and evaluation on state-of-the-art FPGAs., , and . J. Cryptogr. Eng., 10 (3): 229-247 (2020)On the application of Two-Photon Absorption for Laser Fault Injection attacks Pushing the physical boundaries for Laser-based Fault Injection., , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (4): 862-885 (2022)Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 414-460 (2022)