Total number of publications: 8
2024
-
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis
IACR Transactions on Cryptographic Hardware and Embedded Systems, year: 2024
2022
-
DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits
International Conference on Cryptology in Africa, year: 2022
-
SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes
Proceedings of the 19th International Conference on Security and Cryptography, year: 2022
2021
-
A formula for disaster: a unified approach to elliptic curve special-point-based attacks
Advances in Cryptology – ASIACRYPT 2021, year: 2021
2020
-
Fooling primality tests on smartcards
25th European Symposium on Research in Computer Security (ESORICS) 2020, year: 2020
-
Minerva: The curse of ECDSA nonces
IACR Transactions on Cryptographic Hardware and Embedded Systems, year: 2020
2019
-
I want to break square-free: The 4p - 1 factorization method and its RSA backdoor viability
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT, year: 2019
2017
-
Circular units of real abelian fields with four ramified primes
Archivum Mathematicum, year: 2017, volume: 53, edition: 4, DOI