Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electromagnetic Side Channels of an FPGA Implementation of AES., , , and . IACR Cryptol. ePrint Arch., (2004)Smart-card Deployment of an Electronic Voting Protocol., , and . ICISSP, page 503-510. SciTePress, (2019)White-Box ECDSA: Challenges and Existing Solutions., , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 184-201. Springer, (2021)Post-Quantum Protocols for Banking Applications., , and . CARDIS, volume 13820 of Lecture Notes in Computer Science, page 271-289. Springer, (2022)Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis., , and . IACR Cryptol. ePrint Arch., (2008)Augmented Voting Reality., , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 311-316. Springer, (2020)Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design., , and . IACR Cryptol. ePrint Arch., (2004)Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability., , , , , , , and . CCS, page 397-410. ACM, (2022)Algebraic Side-Channel Attacks on Masked Implementations of AES., , and . ICETE (2), page 424-435. SciTePress, (2018)Generalizing Square Attack using Side-Channels of an AES Implementation on an FPGA., , , and . FPL, page 433-437. IEEE, (2005)