| Publication | Date of Publication | Type |
|---|
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor Information Security and Cryptology | 2022-10-14 | Paper |
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n) IEEE Transactions on Computers | 2018-06-12 | Paper |
Elliptic-Curve-Based Security Processor for RFID IEEE Transactions on Computers | 2017-08-08 | Paper |
A technique using PUFs for protecting circuit layout designs against reverse engineering Advances in Information and Computer Security | 2015-05-27 | Paper |
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher Lecture Notes in Computer Science | 2013-06-04 | Paper |
An extension of fault sensitivity analysis based on clockwise collision Information Security and Cryptology | 2013-05-28 | Paper |
Boomerang distinguishers for full HAS-160 compression function Advances in Information and Computer Security | 2013-04-04 | Paper |
Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function Advances in Information and Computer Security | 2013-04-04 | Paper |
Three-subset meet-in-the-middle attack on reduced XTEA Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
New truncated differential cryptanalysis on 3D block cipher Information Security Practice and Experience | 2012-06-29 | Paper |
Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity Advances in Information and Computer Security | 2011-11-10 | Paper |
Fault analysis on stream cipher MUGI Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Bit-Free Collision: Application to APOP Attack Advances in Information and Computer Security | 2009-10-28 | Paper |
Fault Analysis Attack against an AES Prototype Chip Using RSL Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Modular Reduction in GF(2 n ) without Pre-computational Phase Arithmetic of Finite Fields | 2008-08-19 | Paper |
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller Computers and Electrical Engineering | 2007-10-10 | Paper |
Efficient and secure fingerprint verification for embedded devices EURASIP Journal on Applied Signal Processing | 2006-08-28 | Paper |