Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors., and . J. Cryptol., 31 (4): 1164-1182 (2018)An approach to introducing locality in remote attestation using near field communications., and . J. Supercomput., 55 (2): 207-227 (2011)Power and EM Attacks on Passive 13.56 MHz RFID Devices., , and . CHES, volume 4727 of Lecture Notes in Computer Science, page 320-333. Springer, (2007)Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks., and . RFID-TA, page 335-342. IEEE, (2011)Low-Latency Hardware Masking with Application to AES., , , and . IACR Cryptol. ePrint Arch., (2020)Threshold Implementations in Industry: A Case Study on SHA-256.. TIS@CCS, page 37. ACM, (2016)Optical Fault Attacks on AES: A Threat in Violet., , and . FDTC, page 13-22. IEEE Computer Society, (2009)Efficient Multiplication on Low-Resource Devices., and . DSD, page 175-182. IEEE Computer Society, (2014)A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs., and . CARDIS, volume 7079 of Lecture Notes in Computer Science, page 182-198. Springer, (2011)The Temperature Side Channel and Heating Fault Attacks., and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 219-235. Springer, (2013)