Author of the publication

Key Bit-Dependent Attack on Protected PKC Using a Single Trace.

, and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 168-185. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm., , , , and . Inf., 12 (11): 462 (2021)Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)Fault Injection Method for Hardware-implemented AES without Artificial Triggering., , , , , and . ICEA, page 40:1-40:6. ACM, (2020)PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations., , , , , , , , , and 1 other author(s). ICISC, volume 12593 of Lecture Notes in Computer Science, page 99-122. Springer, (2020)Chosen-Ciphertext Clustering Attack on CRYSTALS-KYBER Using the Side-Channel Leakage of Barrett Reduction., , and . IEEE Internet Things J., 9 (21): 21382-21397 (2022)Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling., , , , , , , and . IEEE Access, (2021)A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2020)Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication., , and . ICEA, page 32:1-32:6. ACM, (2020)Improved Correlation Power Analysis on Bitslice Block Ciphers., , , , and . IEEE Access, (2022)Key Bit-Dependent Attack on Protected PKC Using a Single Trace., and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 168-185. Springer, (2017)