Author of the publication

Putting together What Fits together - GrÆStl.

, , and . CARDIS, volume 7771 of Lecture Notes in Computer Science, page 173-187. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks., and . RFID-TA, page 335-342. IEEE, (2011)Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors., and . J. Cryptol., 31 (4): 1164-1182 (2018)An approach to introducing locality in remote attestation using near field communications., and . J. Supercomput., 55 (2): 207-227 (2011)Power and EM Attacks on Passive 13.56 MHz RFID Devices., , and . CHES, volume 4727 of Lecture Notes in Computer Science, page 320-333. Springer, (2007)Threshold Implementations in Industry: A Case Study on SHA-256.. TIS@CCS, page 37. ACM, (2016)Low-Latency Hardware Masking with Application to AES., , , and . IACR Cryptol. ePrint Arch., (2020)Optical Fault Attacks on AES: A Threat in Violet., , and . FDTC, page 13-22. IEEE Computer Society, (2009)Efficient Multiplication on Low-Resource Devices., and . DSD, page 175-182. IEEE Computer Society, (2014)Die Produktion von Recht. Die Einheit der Gesellschaftswissenschaften Mohr, Tübingen, (1989)Die Gestaltung von Property Rights als Mittel gesellschaftlich-wirtschaftlicher Allokation. Beiträge zur ökonomischen Forschung Vandenhoeck & Ruprecht, Göttingen, (1979)