Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic parsing of X.509: Eradicating security issues with a parse tree., , and . Journal of Computer Security, 26 (6): 817-849 (2018)Automated instantiation of side-channel attacks countermeasures for software cipher implementations., , and . Conf. Computing Frontiers, page 455-460. ACM, (2016)Securing software cryptographic primitives for embedded systems against side channel attacks., , and . ICCST, page 1-6. IEEE, (2014)A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications., , , , and . IACR Cryptology ePrint Archive, (2019)ShieldFS: a self-healing, ransomware-aware filesystem., , , , , , and . ACSAC, page 336-347. ACM, (2016)Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks., , and . IACR Cryptology ePrint Archive, (2014)Exploring Cortex-M Microarchitectural Side Channel Information Leakage., , , and . IEEE Access, (2021)On the Computational Hardness of the Code Equivalence Problem in Cryptography., , , and . IACR Cryptol. ePrint Arch., (2022)OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives., , , and . Concurr. Comput. Pract. Exp., 27 (14): 3633-3660 (2015)Locating Side Channel Leakage in Time through Matched Filters., , and . Cryptogr., 6 (2): 26 (2022)