| Publication | Date of Publication | Type |
|---|
| Quantitative fault injection analysis | 2024-09-13 | Paper |
| Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms | 2024-06-11 | Paper |
| Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware | 2024-04-26 | Paper |
Finding and evaluating parameters for BGV Progress in Cryptology - AFRICACRYPT 2023 | 2024-02-02 | Paper |
Secure Implementation of Lattice-Based Encryption Schemes Advanced Boolean Techniques | 2024-01-23 | Paper |
A holistic approach towards side-channel secure fixed-weight polynomial sampling Lecture Notes in Computer Science | 2023-11-16 | Paper |
Efficiently masking polynomial inversion at arbitrary order Post-Quantum Cryptography | 2023-07-07 | Paper |
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices IEEE Transactions on Computers | 2022-08-05 | Paper |
| Deep neural network attribution methods for leakage analysis and symmetric key recovery | 2020-07-21 | Paper |
| Implementing the NewHope-simple key exchange on low-cost FPGAs | 2020-03-02 | Paper |
| Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto | 2020-01-28 | Paper |
| Profiled power analysis attacks using convolutional neural networks with domain knowledge | 2019-02-20 | Paper |
GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs IEEE Transactions on Computers | 2018-06-27 | Paper |
White-box cryptography in the gray box Fast Software Encryption | 2018-05-09 | Paper |
| CAKE: CODE-based algorithm for key encapsulation | 2018-04-20 | Paper |
| Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms | 2018-02-16 | Paper |
| Strong 8-bit sboxes with efficient masking in hardware | 2018-02-14 | Paper |
Cryptanalysis with COPACOBANA IEEE Transactions on Computers | 2017-08-08 | Paper |
Secure and private, yet lightweight, authentication for the IoT via PUF and CBKA Information Security and Cryptology – ICISC 2016 | 2017-05-19 | Paper |
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware IEEE Transactions on Computers | 2017-05-16 | Paper |
Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Affine equivalence and its application to tightening threshold implementations Lecture Notes in Computer Science | 2016-05-19 | Paper |
IND-CCA secure hybrid encryption from QC-MDPC Niederreiter Post-Quantum Cryptography | 2016-04-26 | Paper |
Arithmetic Addition over Boolean Masking Applied Cryptography and Network Security | 2016-03-10 | Paper |
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers Progress in Cryptology -- LATINCRYPT 2015 | 2015-09-17 | Paper |
High-speed signatures from standard lattices Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
Enhanced lattice-based signatures on reconfigurable hardware Advanced Information Systems Engineering | 2015-07-21 | Paper |
Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices Post-Quantum Cryptography | 2015-01-14 | Paper |
Embedded syndrome-based hashing Lecture Notes in Computer Science | 2014-08-20 | Paper |
Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Software speed records for lattice-based signatures Post-Quantum Cryptography | 2013-06-14 | Paper |
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Full Lattice Basis Reduction on Graphics Cards Research in Cryptology | 2012-10-16 | Paper |
Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware Lecture Notes in Computer Science | 2011-12-02 | Paper |
Generic Side-Channel Countermeasures for Reconfigurable Devices Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
MicroEliece: McEliece for Embedded Devices Lecture Notes in Computer Science | 2009-11-10 | Paper |
| Parallel computing with low-cost FPGAs: a framework for COPACOBANA | 2009-02-09 | Paper |
Efficient Hash Collision Search Strategies on Special-Purpose Hardware Research in Cryptology | 2009-01-22 | Paper |
Exploiting the Power of GPUs for Asymmetric Cryptography Cryptographic Hardware and Embedded Systems – CHES 2008 | 2009-01-09 | Paper |
Efficient hardware implementation of finite fields with applications to cryptography Acta Applicandae Mathematicae | 2006-11-06 | Paper |