The following pages link to Werner Schindler (Q832385):
Displaying 34 items.
- Subsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluations (Q832386) (← links)
- On the distribution of order types (Q1188283) (← links)
- (Q1362351) (redirect page) (← links)
- On the efficient simulation of a particular class of random rotations relevant to computer graphics (Q1362352) (← links)
- Exclusive exponent blinding may not suffice to prevent timing attacks on RSA (Q1695869) (← links)
- Equivariant mappings: A new approach in stochastic simulations (Q1841993) (← links)
- Measures with symmetry properties (Q1854111) (← links)
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods (Q2048183) (← links)
- (Q2772818) (← links)
- When Should an Implementation Attack Be Viewed as Successful? (Q2867256) (← links)
- A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models (Q2890018) (← links)
- Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security (Q3011304) (← links)
- (Q3043944) (← links)
- (Q3148766) (← links)
- Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking (Q3537425) (← links)
- How to Compare Profiled Side-Channel Attacks? (Q3630249) (← links)
- A New Side-Channel Attack on RSA Prime Generation (Q3642927) (← links)
- Optimal Recovery of Secret Keys from Weak Side Channel Traces (Q3654634) (← links)
- (Q4002976) (← links)
- Iwasawa's Theorem and Integrals on Lie Groups (Q4302896) (← links)
- A Generalization of Weyl's Integration Theorem and Its Meaning for Stochastic Simulations (Q4316543) (← links)
- A Sufficient Statistic for Con‐invariant Test Problems (Q4321094) (← links)
- (Q4414274) (← links)
- (Q4425728) (← links)
- (Q4536212) (← links)
- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies (Q4550273) (← links)
- (Q4797789) (← links)
- Bi‐invariant Integrals on GL(<i>n</i>) with Applications (Q4843556) (← links)
- Cache Based Remote Timing Attack on the AES (Q5385958) (← links)
- Cryptography and Coding (Q5428167) (← links)
- Cryptography and Coding (Q5428169) (← links)
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL (Q5458944) (← links)
- Security in Communication Networks (Q5491711) (← links)
- Public Key Cryptography - PKC 2005 (Q5711588) (← links)