From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Online template attacks., , , , и . J. Cryptographic Engineering, 9 (1): 21-36 (2019)Multiprecision multiplication on AVR revisited., и . IACR Cryptology ePrint Archive, (2014)High-speed high-security signatures., , , , и . J. Cryptographic Engineering, 2 (2): 77-89 (2012)Online Template Attacks., , , , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 21-36. Springer, (2014)ECC2K-130 on NVIDIA GPUs., , , , , , и . INDOCRYPT, том 6498 из Lecture Notes in Computer Science, стр. 328-346. Springer, (2010)Testing side-channel security of cryptographic implementations against future microarchitectures., , , , , , , , , и . CoRR, (2024)X-Wing: The Hybrid KEM You've Been Looking For., , , , , , и . IACR Cryptol. ePrint Arch., (2024)“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks., , , , , , , и . IACR Cryptol. ePrint Arch., (2021)Spectre Declassified: Reading from the Right Place at the Wrong Time., , , , , , , , , и . IACR Cryptol. ePrint Arch., (2022)Formally verifying Kyber Part I: Implementation Correctness., , , , , , , , , и 2 other автор(ы). IACR Cryptol. ePrint Arch., (2023)