Search for persons
X
?
Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science ,
1
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementa..:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
2
Disorientation Faults in CSIDH:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023 ,
3
A Lightweight Identification Protocol Based on Lattices:
, In:
?
Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science ,
4
On the Feasibility of Single-Trace Attacks on the Gaussian ..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
7
Machine-Learning Side-Channel Attacks on the GALACTICS Cons..:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
9
Safe-Error Attacks on SIKE and CSIDH:
, In:
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
10
On Quantum Ciphertext Indistinguishability, Recoverability,..:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
12
On the Related-Key Attack Security of Authenticated Encrypt..:
, In:
?
Progress in Cryptology - AFRICACRYPT 2022; Lecture Notes in Computer Science ,
13
Recovering Rainbow's Secret Key with a First-Order Fault At..:
, In:
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
14
Verifying Post-Quantum Signatures in 8 kB of RAM:
, In:
?
Progress in Cryptology – INDOCRYPT 2020; Lecture Notes in Computer Science ,
15