Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code.
IACR Cryptol. ePrint Arch., 2025
Revisiting the analysis of references among Common Criteria certified products.
Comput. Secur., 2025
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
"These results must be false": A usability evaluation of constant-time analysis tools.
IACR Cryptol. ePrint Arch., 2024
sec-certs: Examining the security certification practice for better vulnerability mitigation.
Comput. Secur., 2024
Chain of Trust: Unraveling References Among Common Criteria Certified Products.
Proceedings of the ICT Systems Security and Privacy Protection, 2024
They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
IACR Cryptol. ePrint Arch., 2023
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
A formula for disaster: a unified approach to elliptic curve special-point-based attacks.
IACR Cryptol. ePrint Arch., 2021
âTheyâre not that hard to mitigateâ: What Cryptographic Library Developers Think About Timing Attacks.
IACR Cryptol. ePrint Arch., 2021
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Fooling primality tests on smartcards.
IACR Cryptol. ePrint Arch., 2020
Minerva: The curse of ECDSA nonces.
IACR Cryptol. ePrint Arch., 2020