| Publication | Date of Publication | Type |
|---|
| Quantitative fault injection analysis | 2024-09-13 | Paper |
| Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms | 2024-06-11 | Paper |
| Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware | 2024-04-26 | Paper |
| Finding and evaluating parameters for BGV | 2024-02-02 | Paper |
| Secure Implementation of Lattice-Based Encryption Schemes | 2024-01-23 | Paper |
| A holistic approach towards side-channel secure fixed-weight polynomial sampling | 2023-11-16 | Paper |
| Efficiently masking polynomial inversion at arbitrary order | 2023-07-07 | Paper |
| Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices | 2022-08-05 | Paper |
| Deep neural network attribution methods for leakage analysis and symmetric key recovery | 2020-07-21 | Paper |
| Implementing the NewHope-simple key exchange on low-cost FPGAs | 2020-03-02 | Paper |
| Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto | 2020-01-28 | Paper |
| Profiled power analysis attacks using convolutional neural networks with domain knowledge | 2019-02-20 | Paper |
| GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs | 2018-06-27 | Paper |
| White-box cryptography in the gray box | 2018-05-09 | Paper |
| CAKE: CODE-based algorithm for key encapsulation | 2018-04-20 | Paper |
| Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms | 2018-02-16 | Paper |
| Strong 8-bit sboxes with efficient masking in hardware | 2018-02-14 | Paper |
| Cryptanalysis with COPACOBANA | 2017-08-08 | Paper |
| Secure and private, yet lightweight, authentication for the IoT via PUF and CBKA | 2017-05-19 | Paper |
| Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware | 2017-05-16 | Paper |
| Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware | 2017-04-12 | Paper |
| ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks | 2016-10-27 | Paper |
| Affine equivalence and its application to tightening threshold implementations | 2016-05-19 | Paper |
| IND-CCA secure hybrid encryption from QC-MDPC Niederreiter | 2016-04-26 | Paper |
| Arithmetic Addition over Boolean Masking | 2016-03-10 | Paper |
| Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware | 2015-10-01 | Paper |
| High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers | 2015-09-17 | Paper |
| High-speed signatures from standard lattices | 2015-09-17 | Paper |
| Enhanced lattice-based signatures on reconfigurable hardware | 2015-07-21 | Paper |
| Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices | 2015-01-14 | Paper |
| Embedded syndrome-based hashing | 2014-08-20 | Paper |
| Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices | 2013-10-10 | Paper |
| Software speed records for lattice-based signatures | 2013-06-14 | Paper |
| PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract | 2013-03-19 | Paper |
| Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems | 2012-11-13 | Paper |
| Full Lattice Basis Reduction on Graphics Cards | 2012-10-16 | Paper |
| Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware | 2012-09-21 | Paper |
| Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices | 2012-07-23 | Paper |
| An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware | 2011-12-02 | Paper |
| Generic Side-Channel Countermeasures for Reconfigurable Devices | 2011-10-07 | Paper |
| MicroEliece: McEliece for Embedded Devices | 2009-11-10 | Paper |
| Parallel computing with low-cost FPGAs: a framework for COPACOBANA | 2009-02-09 | Paper |
| Efficient Hash Collision Search Strategies on Special-Purpose Hardware | 2009-01-22 | Paper |
| Exploiting the Power of GPUs for Asymmetric Cryptography | 2009-01-09 | Paper |
| Efficient hardware implementation of finite fields with applications to cryptography | 2006-11-06 | Paper |