| Publication | Date of Publication | Type |
|---|
Subsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluations | 2022-03-25 | Paper |
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods Journal of Mathematical Cryptology | 2021-08-05 | Paper |
Exclusive exponent blinding may not suffice to prevent timing attacks on RSA | 2018-02-14 | Paper |
When should an implementation attack be viewed as successful? Lecture Notes in Computer Science | 2013-12-10 | Paper |
A new difference method for side-channel analysis with high-dimensional leakage models Lecture Notes in Computer Science | 2012-06-08 | Paper |
Exponent blinding does not always lift (partial) spa resistance to higher-level security Applied Cryptography and Network Security | 2011-06-28 | Paper |
Optimal recovery of secret keys from weak side channel traces Cryptography and Coding | 2010-01-07 | Paper |
A New Side-Channel Attack on RSA Prime Generation Lecture Notes in Computer Science | 2009-11-10 | Paper |
How to Compare Profiled Side-Channel Attacks? Applied Cryptography and Network Security | 2009-06-03 | Paper |
Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking Journal of Mathematical Cryptology | 2008-11-06 | Paper |
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Cache Based Remote Timing Attack on the AES Lecture Notes in Computer Science | 2008-04-17 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2007-11-28 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2007-11-28 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
scientific article; zbMATH DE number 2085436 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 1804022 (Why is no real title available?) | 2003-11-16 | Paper |
scientific article; zbMATH DE number 1979300 (Why is no real title available?) | 2003-09-11 | Paper |
scientific article; zbMATH DE number 1952894 (Why is no real title available?) | 2003-07-24 | Paper |
scientific article; zbMATH DE number 1878327 (Why is no real title available?) | 2003-03-09 | Paper |
Measures with symmetry properties Lecture Notes in Mathematics | 2003-01-27 | Paper |
scientific article; zbMATH DE number 1759286 (Why is no real title available?) | 2002-11-28 | Paper |
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies Cryptography and Coding | 2002-11-25 | Paper |
How to become a wizard at figures The Australian Mathematical Society Gazette | 2002-02-19 | Paper |
On the efficient simulation of a particular class of random rotations relevant to computer graphics Journal of Computational and Applied Mathematics | 1997-12-17 | Paper |
Bi‐invariant Integrals on GL(n) with Applications Mathematische Nachrichten | 1995-08-13 | Paper |
Equivariant mappings: A new approach in stochastic simulations Computational Geometry | 1995-04-09 | Paper |
A Generalization of Weyl's Integration Theorem and Its Meaning for Stochastic Simulations Mathematics of Operations Research | 1995-03-26 | Paper |
A Sufficient Statistic for Con‐invariant Test Problems Mathematische Nachrichten | 1995-01-19 | Paper |
Iwasawa's Theorem and Integrals on Lie Groups Mathematische Nachrichten | 1994-11-24 | Paper |
scientific article; zbMATH DE number 52692 (Why is no real title available?) | 1993-01-23 | Paper |
On the distribution of order types Computational Geometry | 1992-08-13 | Paper |