Author of the publication

Investigating Profiled Side-Channel Attacks Against the DES Key Schedule.

, , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (3): 22-72 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unlock the Door to my Secrets, but don't Forget to Glitch A comprehensive analysis of flash erase suppression attacks., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (2): 88-129 (2024)To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures., , and . ASHES@CCS, page 85-94. ACM, (2022)Taking a Look into Execute-Only Memory., and . WOOT @ USENIX Security Symposium, USENIX Association, (2019)Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or SPHINCS+ Signatures., , , , and . PQCrypto, volume 14154 of Lecture Notes in Computer Science, page 658-687. Springer, (2023)Investigating Profiled Side-Channel Attacks Against the DES Key Schedule., , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (3): 22-72 (2020)Security and Trust in Open Source Security Tokens., , , and . IACR Cryptol. ePrint Arch., (2021)Investigating Profiled Side-Channel Attacks Against the DES Key Schedule., , , , , , , , , and . IACR Cryptol. ePrint Arch., (2019)One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers., , and . WOOT @ USENIX Security Symposium, USENIX Association, (2020)Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers., , , , , and . IACR Cryptol. ePrint Arch., (2020)Indoor localization system for emergency responders with ultra low-power radio landmarks., , , , , , , and . I2MTC, page 309-314. IEEE, (2015)