Personensuche
X
?
Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science ,
1
Towards Private Deep Learning-Based Side-Channel Analysis U..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
2
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applicati..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
6
Reinforced Concrete : A Fast Hash Function for Verifiabl..:
, In:
?
Lecture Notes in Civil Engineering; Farm Machinery and Processes Management in Sustainable Agriculture ,
8
Tillage Quality and Draught Force of a Novel Plough Concept..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
9
Truncated Differential Properties of the Diagonal Set of In..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
10
Shorter Signatures Based on Tailor-Made Minimalist Symmetri..:
, In:
?
Security and Artificial Intelligence; Lecture Notes in Computer Science ,
11
Privacy-Preserving Machine Learning Using Cryptography:
, In:
?
Selected Areas in Cryptography; Lecture Notes in Computer Science ,
12
Weak-Key Distinguishers for AES:
, In:
?
Advances in Cryptology – EUROCRYPT 2020; Lecture Notes in Computer Science ,
14
On a Generalization of Substitution-Permutation Networks: T..:
, In:
?
Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science ,
15