Michael Tunstall

From MaRDI portal
Person:892278



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
Lecture Notes in Computer Science
2016-03-02Paper
The distributions of individual bits in the output of multiplicative operations
Cryptography and Communications
2015-11-18Paper
Masking tables -- an underestimated security risk
Fast Software Encryption
2015-09-18Paper
Online template attacks
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Simulatable leakage: analysis, pitfalls, and new constructions
Lecture Notes in Computer Science
2015-01-16Paper
Infective computation and dummy rounds: fault protection for block ciphers without check-before-output
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Combined implementation attack resistant exponentiation
Lecture Notes in Computer Science
2010-08-31Paper
Coordinate blinding over large prime fields
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Distinguishing Multiplications from Squaring Operations
Selected Areas in Cryptography
2009-11-03Paper
Exponent Recoding and Regular Exponentiation Algorithms
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Random Order m-ary Exponentiation
Information Security and Privacy
2009-06-25Paper
Cache Based Power Analysis Attacks on AES
Information Security and Privacy
2007-09-07Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
scientific article; zbMATH DE number 1759356 (Why is no real title available?)
 
2002-11-28Paper
scientific article; zbMATH DE number 1759295 (Why is no real title available?)
 
2002-11-28Paper


Research outcomes over time


This page was built for person: Michael Tunstall