Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions., , , , , , , and . USENIX Security Symposium, page 1991-2008. USENIX Association, (2023)Pitfalls and Shortcomings for Decompositions and Alignment., , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 318-347. Springer, (2023)Linearly Self-Equivalent APN Permutations in Small Dimension., , and . IEEE Trans. Inf. Theory, 67 (7): 4863-4875 (2021)New Instances of Quadratic APN Functions., and . IEEE Trans. Inf. Theory, 68 (1): 670-678 (2022)ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions., , , , , , , and . CoRR, (2021)Pitfalls and Shortcomings for Decompositions and Alignment (Full Version)., , and . IACR Cryptol. ePrint Arch., (2023)Mathematical Aspects of Division Property., , and . IACR Cryptol. ePrint Arch., (2022)Weak-Key Subspace Trails and Applications to AES., , , , and . IACR Cryptol. ePrint Arch., (2019)Switchings, extensions, and reductions in central digraphs., , and . J. Comb. Theory, Ser. A, 118 (7): 2025-2034 (2011)A class of quadratic APN binomials inequivalent to power functions., , and . IACR Cryptology ePrint Archive, (2006)