Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dude, is my code constant time?, , and . DATE, page 1697-1702. IEEE, (2017)Anonymous Split E-Cash - Toward Mobile Anonymous Payments., , , , and . ACM Trans. Embed. Comput. Syst., 14 (4): 85:1-85:25 (2015)A Side-Channel Resistant Implementation of SABER., , , , and . IACR Cryptol. ePrint Arch., (2020)Towards Efficient and Automated Side Channel Evaluations at Design Time., , , , and . PROOFS, volume 7 of Kalpa Publications in Computing, page 16-31. EasyChair, (2018)A Side-Channel-Resistant Implementation of SABER., , , , and . ACM J. Emerg. Technol. Comput. Syst., 17 (2): 10:1-10:26 (2021)Design and Implementation of a Waveform-Matching Based Triggering System., , , and . COSADE, volume 9689 of Lecture Notes in Computer Science, page 184-198. Springer, (2016)An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P., , , , and . CARDIS, volume 11389 of Lecture Notes in Computer Science, page 156-170. Springer, (2018)Private Mobile Pay-TV From Priced Oblivious Transfer., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (2): 280-291 (2018)DPA, Bitslicing and Masking at 1 GHz., , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 599-619. Springer, (2015)Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware., , , and . DATE, page 1-2. IEEE, (2023)