| Publication | Date of Publication | Type |
|---|
| Excalibur key-generation protocols for DAG hierarchic decryption | 2019-03-29 | Paper |
Blending FHE-NTRU keys -- the excalibur property Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
A survey of fault attacks in pairing based cryptography Cryptography and Communications | 2015-11-18 | Paper |
Inverting the final exponentiation of Tate pairings on ordinary elliptic curves using faults Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
A survey of differential fault analysis against classical RSA implementations Information Security and Cryptography | 2013-07-09 | Paper |
Impact of S-boxes size upon side channel resistance and block cipher design Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
Higher-order masking schemes for S-boxes Fast Software Encryption | 2013-01-08 | Paper |
Secret key leakage from public key perturbation of DLP-based cryptosystems Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Protecting AES with Shamir's secret sharing scheme Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
Public Key Perturbation of Randomized RSA Implementations Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
A generic protection against high-order differential power analysis. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Fault analysis of Rabbit: toward a secret key leakage Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Perturbating RSA Public Keys: An Improved Attack Cryptographic Hardware and Embedded Systems – CHES 2008 | 2009-01-09 | Paper |
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator Fast Software Encryption | 2008-09-18 | Paper |
Cryptanalysis of White Box DES Implementations Selected Areas in Cryptography | 2008-03-25 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
| scientific article; zbMATH DE number 2085432 (Why is no real title available?) | 2004-08-09 | Paper |
Construction of large families of pseudorandom binary sequences Journal of Number Theory | 2004-08-04 | Paper |
A Fast and Secure Implementation of Sflash Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
| scientific article; zbMATH DE number 1878319 (Why is no real title available?) | 2003-03-09 | Paper |
| scientific article; zbMATH DE number 1759296 (Why is no real title available?) | 2002-11-28 | Paper |
| scientific article; zbMATH DE number 1617934 (Why is no real title available?) | 2001-11-18 | Paper |
| scientific article; zbMATH DE number 1617933 (Why is no real title available?) | 2001-07-12 | Paper |
| scientific article; zbMATH DE number 1583768 (Why is no real title available?) | 2001-07-03 | Paper |
| scientific article; zbMATH DE number 1504808 (Why is no real title available?) | 2001-03-04 | Paper |
Unbalanced Oil and Vinegar Signature Schemes Advances in Cryptology — EUROCRYPT ’99 | 2000-04-06 | Paper |
| scientific article; zbMATH DE number 1302783 (Why is no real title available?) | 1999-10-06 | Paper |
| scientific article; zbMATH DE number 1303122 (Why is no real title available?) | 1999-09-06 | Paper |
| scientific article; zbMATH DE number 1107703 (Why is no real title available?) | 1998-08-17 | Paper |
| scientific article; zbMATH DE number 1107704 (Why is no real title available?) | 1998-02-16 | Paper |
Sommes d'exponentielles et principe de l'hyperbole Acta Arithmetica | 1996-10-13 | Paper |
Exponential sums with multiplicative coefficients and integers without large prime factor Acta Mathematica Hungarica | 1996-07-16 | Paper |