The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Tunstall: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jacques J. A. Fournier, Michael Tunstall
    Cache Based Power Analysis Attacks on AES. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:17-28 [Conf]
  2. David Naccache, Michael Tunstall
    How to Explain Side-Channel Leakage to Your Kids. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:229-230 [Conf]
  3. David M'Raïhi, David Naccache, Michael Tunstall
    Asymmetric Currency Rounding. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:192-201 [Conf]
  4. Frederic Amiel, Christophe Clavier, Michael Tunstall
    Fault Analysis of DPA-Resistant Algorithms. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:223-236 [Conf]
  5. Michael Tunstall, Constantinos Markantonakis, Keith Mayes
    Inhibiting Card Sharing Attacks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:239-251 [Conf]
  6. David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan
    Experimenting with Faults, Lattices and the DSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:16-28 [Conf]
  7. Michael Tunstall, Olivier Benoit
    Efficient Use of Random Delays in Embedded Software. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:27-38 [Conf]

  8. Random Order m-ary Exponentiation. [Citation Graph (, )][DBLP]


  9. Improved Fault Analysis of Signature Schemes. [Citation Graph (, )][DBLP]


  10. Coordinate Blinding over Large Prime Fields. [Citation Graph (, )][DBLP]


  11. Montgomery Multiplication with Redundancy Check. [Citation Graph (, )][DBLP]


  12. Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. [Citation Graph (, )][DBLP]


  13. Distinguishing Multiplications from Squaring Operations. [Citation Graph (, )][DBLP]


  14. Securing OpenSSL against Micro-Architectural Attacks. [Citation Graph (, )][DBLP]


  15. Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. [Citation Graph (, )][DBLP]


  16. Unknown Plaintext Template Attacks. [Citation Graph (, )][DBLP]


  17. Exponent Recoding and Regular Exponentiation Algorithms. [Citation Graph (, )][DBLP]


  18. Combined Implementation Attack Resistant Exponentiation. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002