关注
Michael Tunstall
Michael Tunstall
Cryptography Research
在 cryptography.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
The sorcerer's apprentice guide to fault attacks
H Bar-El, H Choukri, D Naccache, M Tunstall, C Whelan
Proceedings of the IEEE 94 (2), 370-382, 2006
11762006
Differential fault analysis of the advanced encryption standard using a single fault
M Tunstall, D Mukhopadhyay, S Ali
Information Security Theory and Practice. Security and Privacy of Mobile …, 2011
4372011
Fault analysis in cryptography
M Joye, M Tunstall
Springer, 2012
2572012
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J Longo, E De Mulder, D Page, M Tunstall
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
1742015
Round reduction using faults
H Choukri, M Tunstall
FDTC 5, 13-24, 2005
1362005
Experimenting with Faults, Lattices and the DSA
D Naccache, P Nguyên, M Tunstall, C Whelan
Public Key Cryptography-PKC 2005, 16-28, 2005
1132005
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output
B Gierlichs, JM Schmidt, M Tunstall
Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012
1122012
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
1082006
Compiler Assisted Masking
A Moss, E Oswald, D Page, M Tunstall
Cryptographic Hardware and Embedded Systems–CHES 2012, 58-75, 2012
1062012
Exponent recoding and regular exponentiation algorithms
M Joye, M Tunstall
Progress in Cryptology–AFRICACRYPT 2009: Second International Conference on …, 2009
872009
Online template attacks
L Batina, Ł Chmielewski, L Papachristodoulou, P Schwabe, M Tunstall
Journal of Cryptographic Engineering 9, 21-36, 2019
862019
Differential power analysis of HMAC based on SHA-2, and countermeasures
R McEvoy, M Tunstall, CC Murphy, WP Marnane
Information Security Applications: 8th International Workshop, WISA 2007 …, 2007
862007
Attacking smart card systems: Theory and practice
K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes
information security technical report 14 (2), 46-56, 2009
812009
Side-channel analysis of cryptographic software via early-terminating multiplications
J Großschädl, E Oswald, D Page, M Tunstall
Information, Security and Cryptology–ICISC 2009: 12th International …, 2010
772010
Efficient use of random delays in embedded software
M Tunstall, O Benoit
Information Security Theory and Practices. Smart Cards, Mobile and …, 2007
682007
Differential fault analysis of AES: towards reaching its limits
SS Ali, D Mukhopadhyay, M Tunstall
Journal of Cryptographic Engineering 3, 73-97, 2013
642013
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
R Avanzi, S Hoerder, D Page, M Tunstall
Journal of Cryptographic Engineering 1, 271-281, 2011
622011
Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
N Hanley, HS Kim, M Tunstall
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
612015
Fault analysis of DPA-resistant algorithms
F Amiel, C Clavier, M Tunstall
International Workshop on Fault Diagnosis and Tolerance in Cryptography, 223-236, 2006
612006
Isolated WDDL: A hiding countermeasure for differential power analysis on FPGAs
RP McEvoy, CC Murphy, WP Marnane, M Tunstall
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2 (1), 1-23, 2009
592009
系统目前无法执行此操作,请稍后再试。
文章 1–20