Michael Tunstall

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
Lecture Notes in Computer Science
2016-03-02Paper
The distributions of individual bits in the output of multiplicative operations
Cryptography and Communications
2015-11-18Paper
Masking tables -- an underestimated security risk
Fast Software Encryption
2015-09-18Paper
Online template attacks
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Simulatable leakage: analysis, pitfalls, and new constructions
Lecture Notes in Computer Science
2015-01-16Paper
Infective computation and dummy rounds: fault protection for block ciphers without check-before-output
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Combined implementation attack resistant exponentiation
Lecture Notes in Computer Science
2010-08-31Paper
Coordinate blinding over large prime fields
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Distinguishing Multiplications from Squaring Operations
Selected Areas in Cryptography
2009-11-03Paper
Exponent Recoding and Regular Exponentiation Algorithms
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Random Order m-ary Exponentiation
Information Security and Privacy
2009-06-25Paper
Cache Based Power Analysis Attacks on AES
Information Security and Privacy
2007-09-07Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
scientific article; zbMATH DE number 1759356 (Why is no real title available?)2002-11-28Paper
scientific article; zbMATH DE number 1759295 (Why is no real title available?)2002-11-28Paper


Research outcomes over time


This page was built for person: Michael Tunstall