| Publication | Date of Publication | Type |
|---|
| Gradient visualization for general characterization in profiling attacks | 2023-10-20 | Paper |
| On the implementation efficiency of linear regression-based side-channel attacks | 2022-12-16 | Paper |
| Random probing security: verification, composition, expansion and new constructions | 2022-11-09 | Paper |
| Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version | 2022-04-01 | Paper |
| Lower and upper bounds on the randomness complexity of private computations of AND | 2021-03-30 | Paper |
| On the use of independent component analysis to denoise side-channel measurements | 2020-07-20 | Paper |
| Convolutional neural networks with data augmentation against jitter-based countermeasures. Profiling attacks without pre-processing | 2020-06-24 | Paper |
| Lower and upper bounds on the randomness complexity of private computations of AND | 2020-04-30 | Paper |
| Breaking cryptographic implementations using deep learning techniques | 2018-10-26 | Paper |
| Horizontal side-channel attacks and countermeasures on the ISW masking scheme | 2018-02-14 | Paper |
| Faster evaluation of sboxes via common shares | 2018-02-14 | Paper |
| Improved side-channel analysis of finite-field multiplication | 2018-02-14 | Paper |
| Private multiplication over finite fields | 2017-10-27 | Paper |
| Statistical Analysis of Second Order Differential Power Analysis | 2017-08-08 | Paper |
| A New Second-Order Side Channel Attack Based on Linear Regression | 2017-07-12 | Paper |
| Redefining the transparency order | 2017-02-10 | Paper |
| Randomness complexity of private circuits for multiplication | 2016-07-15 | Paper |
| Polynomial evaluation and side channel analysis | 2016-05-02 | Paper |
| Side-channel analysis of Montgomery's representation randomization | 2016-04-13 | Paper |
| Algebraic decomposition for probing security | 2015-12-10 | Paper |
| Horizontal collision correlation attack on elliptic curves | 2015-11-18 | Paper |
| Off-line group signatures with smart cards | 2015-11-11 | Paper |
| Horizontal collision correlation attack on elliptic curves | 2015-10-01 | Paper |
| Higher-order side channel security and mask refreshing | 2015-09-18 | Paper |
| How to Estimate the Success Rate of Higher-Order Side-Channel Attacks | 2015-07-21 | Paper |
| Side-Channel Attack against RSA Key Generation Algorithms | 2015-07-21 | Paper |
| Efficient masked S-boxes processing -- a step forward | 2014-06-24 | Paper |
| On the practical security of a leakage resilient masking scheme | 2014-03-28 | Paper |
| Behind the scene of side channel attacks | 2013-12-10 | Paper |
| Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack | 2013-10-10 | Paper |
| Masking against Side-Channel Attacks: A Formal Security Proof | 2013-05-31 | Paper |
| Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations | 2013-03-18 | Paper |
| Conversion of security proofs from one leakage model to another: a new issue | 2013-02-14 | Paper |
| Higher-order masking schemes for S-boxes | 2013-01-08 | Paper |
| A first-order leak-free masking countermeasure | 2012-06-08 | Paper |
| Mutual information analysis: a comprehensive study | 2012-01-18 | Paper |
| Higher-order glitches free implementation of the AES using secure multi-party computation protocols | 2011-10-07 | Paper |
| Montgomery’s Trick and Fast Implementation of Masked AES | 2011-06-29 | Paper |
| Theoretical and practical aspects of mutual information-based side channel analysis | 2011-04-05 | Paper |
| Affine Masking against Higher-Order Side Channel Analysis | 2011-03-15 | Paper |
| Attack on a higher-order masking of the AES based on homographic functions | 2010-12-07 | Paper |
| Provably secure higher-order masking of AES | 2010-08-17 | Paper |
| Secure multiplicative masking of power functions | 2010-07-06 | Paper |
| On plateaued functions and their constructions. | 2010-01-05 | Paper |
| Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers | 2009-11-10 | Paper |
| Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis | 2008-09-18 | Paper |
| Side Channel Cryptanalysis of a Higher Order Masking Scheme | 2008-09-16 | Paper |
| Fast Software Encryption | 2006-06-22 | Paper |
| Selected Areas in Cryptography | 2005-12-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4832291 | 2005-01-04 | Paper |