Hardware Root-of-Trust implementations in Trusted Execution Environments.
IACR Cryptol. ePrint Arch., 2023
CARAF: Crypto Agility Risk Assessment Framework.
J. Cybersecur., 2021
Error Tolerant ASCA on FPGA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Algebraic Side-Channel Attack on Twofish.
J. Internet Serv. Inf. Secur., 2017
A Tolerant Algebraic Side-Channel Attack on AES Using CP.
Proceedings of the Principles and Practice of Constraint Programming, 2017
Influence of Error on Hamming Weights for ASCA.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014
Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013