Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Near Collision Side Channel Attacks., , and . SAC, volume 9566 of Lecture Notes in Computer Science, page 277-292. Springer, (2015)Clock Glitch Attacks in the Presence of Heating., , , and . FDTC, page 104-114. IEEE Computer Society, (2014)Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes., , , , and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 374-390. Springer, (2014)Optimality and beyond: The case of 4×4 S-boxes., , , , and . HOST, page 80-83. IEEE Computer Society, (2014)Practical Improvements to Statistical Ineffective Fault Attacks., , , and . COSADE, volume 14595 of Lecture Notes in Computer Science, page 59-75. Springer, (2024)Evaluation of Randomness Test Results for Short Sequences., , , and . SETA, volume 6338 of Lecture Notes in Computer Science, page 309-319. Springer, (2010)S-box, SET, Match: A Toolbox for S-box Analysis., , , , and . WISTP, volume 8501 of Lecture Notes in Computer Science, page 140-149. Springer, (2014)Memory Encryption for Smart Cards., , and . CARDIS, volume 7079 of Lecture Notes in Computer Science, page 199-216. Springer, (2011)Improving DPA resistance of S-boxes: How far can we go?, , , and . ISCAS, page 2013-2016. IEEE, (2015)On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box., , , , , and . CS2@HiPEAC, page 13-18. ACM, (2014)