| Publication | Date of Publication | Type |
|---|
Fast analytical rank estimation Constructive Side-Channel Analysis and Secure Design | 2023-10-20 | Paper |
Optimal layouts on a chain ATM network Lecture Notes in Computer Science | 2023-05-08 | Paper |
Crumbling walls: a class of practical and efficient quorum systems Distributed Computing | 2020-12-02 | Paper |
| Poly-logarithmic side channel rank estimation via exponential sampling | 2020-01-28 | Paper |
| Sliding-window correlation attacks against encryption devices with an unstable clock | 2019-02-20 | Paper |
| Cache-attacks on the ARM trustzone implementations of AES-256 and AES-256-GCM via GPU-based analysis | 2019-02-20 | Paper |
Crumbling walls Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing - PODC '95 | 2017-09-29 | Paper |
The load and availability of Byzantine quorum systems Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97 | 2017-09-29 | Paper |
Side-channel cryptographic attacks using pseudo-Boolean optimization Constraints | 2017-08-16 | Paper |
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Optimal availability quorum systems: theory and practice Information Processing Letters | 2016-06-09 | Paper |
How to be an efficient snoop, or the probe complexity of quorum systems (extended abstract) Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing - PODC '96 | 2015-09-11 | Paper |
A new framework for constraint-based probabilistic template side channel attacks Advanced Information Systems Engineering | 2015-07-21 | Paper |
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Algebraic side-channel analysis in the presence of errors Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
Finding a dense-core in jellyfish graphs Computer Networks | 2009-01-20 | Paper |
Bounding the bias of tree-like sampling in IP topologies Networks and Heterogeneous Media | 2008-07-29 | Paper |
Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s Lecture Notes in Computer Science | 2008-06-17 | Paper |
Finding a Dense-Core in Jellyfish Graphs Algorithms and Models for the Web-Graph | 2008-04-11 | Paper |
A geographic directed preferential internet topology model Computer Networks | 2007-09-03 | Paper |
| scientific article; zbMATH DE number 2102679 (Why is no real title available?) | 2004-09-24 | Paper |
Combinatorial design of multi-ring networks with combined routing and flow control. Computer Networks | 2003-08-07 | Paper |
Probabilistic quorum systems Information and Computation | 2003-01-14 | Paper |
How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems SIAM Journal on Discrete Mathematics | 2003-01-05 | Paper |
| scientific article; zbMATH DE number 1759788 (Why is no real title available?) | 2002-10-07 | Paper |
| scientific article; zbMATH DE number 1408379 (Why is no real title available?) | 2002-05-14 | Paper |
The Load and Availability of Byzantine Quorum Systems SIAM Journal on Computing | 2000-10-18 | Paper |
| scientific article; zbMATH DE number 1303136 (Why is no real title available?) | 1999-06-17 | Paper |
Computational experience with approximation algorithms for the set covering problem European Journal of Operational Research | 1999-02-28 | Paper |
The Load, Capacity, and Availability of Quorum Systems SIAM Journal on Computing | 1998-05-10 | Paper |
Optimal layouts on a chain ATM network Discrete Applied Mathematics | 1998-01-01 | Paper |
Randomized approximation of bounded multicovering problems Algorithmica | 1997-10-29 | Paper |
The availability of crumbling wall quorum systems Discrete Applied Mathematics | 1997-10-09 | Paper |
The availability of quorum systems Information and Computation | 1996-02-26 | Paper |