| Publication | Date of Publication | Type |
|---|
Online template attack on ECDSA: extracting keys via the other side Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
When Similarities Among Devices are Taken for Granted: Another Look at Portability Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
| Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices | 2022-07-06 | Paper |
| \textsc{Friet}: an authenticated encryption scheme with built-in fault detection | 2021-12-01 | Paper |
| Location, location, location: revisiting modeling and exploitation for location-based side channel leakages | 2020-05-11 | Paper |
| Breaking Ed25519 in WolfSSL | 2020-01-21 | Paper |
Bitsliced masking and ARM: friends or foes? Lecture Notes in Computer Science | 2019-01-30 | Paper |
| Implementing complete formulas on Weierstrass curves in hardware | 2018-10-26 | Paper |
| Practical fault injection on deterministic signatures: the case of EdDSA | 2018-07-17 | Paper |
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n) IEEE Transactions on Computers | 2018-06-12 | Paper |
Elliptic-Curve-Based Security Processor for RFID IEEE Transactions on Computers | 2017-08-08 | Paper |
Complete addition formulas for prime order elliptic curves Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Extreme pipelining towards the best area-performance trade-off in hardware Progress in Cryptology – AFRICACRYPT 2016 | 2016-06-22 | Paper |
Near collision side channel attacks Lecture Notes in Computer Science | 2016-05-19 | Paper |
An elliptic curve cryptographic processor using Edwards curves and the number theoretic transform Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Online template attacks Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
S-box pipelining using genetic algorithms for high-throughput AES implementations: how fast can we go? Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Hierarchical ECC-based RFID authentication protocol RFID. Security and Privacy | 2012-08-20 | Paper |
Power analysis of atmel cryptomemory -- recovering keys from secure eeproms Lecture Notes in Computer Science | 2012-06-08 | Paper |
Getting more from PCA: First results of using principal component analysis for extensive power analysis Lecture Notes in Computer Science | 2012-06-08 | Paper |
Mutual information analysis: a comprehensive study Journal of Cryptology | 2012-01-18 | Paper |
Revisiting Higher-Order DPA Attacks: Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Differential Cluster Analysis Lecture Notes in Computer Science | 2009-11-10 | Paper |
HECC Goes Embedded: An Area-Efficient Implementation of HECC Selected Areas in Cryptography | 2009-11-03 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
A Very Compact “Perfectly Masked” S-Box for AES Applied Cryptography and Network Security | 2008-06-13 | Paper |
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller Computers and Electrical Engineering | 2007-10-10 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
| scientific article; zbMATH DE number 2079919 (Why is no real title available?) | 2004-08-03 | Paper |
| scientific article; zbMATH DE number 2044537 (Why is no real title available?) | 2004-02-18 | Paper |
Another Way of Doing RSA Cryptography in Hardware Cryptography and Coding | 2002-11-12 | Paper |