Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough., , , and . CARDIS, volume 12609 of Lecture Notes in Computer Science, page 103-118. Springer, (2020)PQ.V.ALU.E: Post-quantum RISC-V Custom ALU Extensions on Dilithium and Kyber., , , , and . CARDIS, volume 14530 of Lecture Notes in Computer Science, page 190-209. Springer, (2023)SCALib: A Side-Channel Analysis Library., and . J. Open Source Softw., 8 (86): 5196 (June 2023)Reducing risks through simplicity: high side-channel security for lazy engineers., , and . J. Cryptogr. Eng., 11 (1): 39-55 (2021)Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber., , , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 236-256. Springer, (2022)Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended., , , and . IEEE Trans. Inf. Forensics Secur., (2022)Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?, , , , and . IACR Cryptol. ePrint Arch., (2021)Worst-case side-channel security: from evaluation of countermeasures to new designs.. Catholic University of Louvain, Louvain-la-Neuve, Belgium, (2022)base-search.net (ftunivlouvain:oai:dial.uclouvain.be:boreal:258155).Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers., , , and . ASHES@CCS, page 1-10. ACM, (2018)Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP., , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 168-183. Springer, (2021)