| Publication | Date of Publication | Type |
|---|
Single trace analysis of comparison operation based constant-time CDT sampling and its countermeasure | 2024-05-31 | Paper |
Differential fault attack on AES using maximum four bytes faulty ciphertexts Lecture Notes in Computer Science | 2023-08-21 | Paper |
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks Information Security Practice and Experience | 2023-06-30 | Paper |
Key Bit-Dependent Attack on Protected PKC Using a Single Trace Information Security Practice and Experience | 2022-12-09 | Paper |
Differential fault attack on lightweight block cipher PIPO | 2022-12-07 | Paper |
Learning-based side-channel analysis on PIPO | 2022-12-07 | Paper |
\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations | 2022-03-24 | Paper |
Efficient conversion method from arithmetic to Boolean masking in constrained devices Constructive Side-Channel Analysis and Secure Design | 2019-09-16 | Paper |
Novel leakage against realistic masking and shuffling countermeasures -- case study on PRINCE and SEED | 2018-06-15 | Paper |
Improved Computation of Square Roots in Specific Finite Fields IEEE Transactions on Computers | 2017-08-08 | Paper |
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
First-order side channel attacks on Zhang's countermeasures Information Sciences | 2012-07-13 | Paper |
A new bit-serial multiplier over \(GF(pm)\) using irreducible trinomials Computers & Mathematics with Applications | 2010-11-08 | Paper |
Further Security Analysis of XTR Information Security Practice and Experience | 2009-04-02 | Paper |
Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices Information Security Practice and Experience | 2009-04-02 | Paper |
Compressed XTR Applied Cryptography and Network Security | 2009-03-10 | Paper |
New Security Problem in RFID Systems “Tag Killing” Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields Cryptology and Network Security | 2009-01-09 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
scientific article; zbMATH DE number 2043311 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 1951623 (Why is no real title available?) | 2003-07-21 | Paper |