Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Michael Tunstall
@inproceedings{DBLP:conf/icete/TunstallPP21, author = {Michael Tunstall and Louiza Papachristodoulou and Kostas Papagiannopoulos}, editor = {Pierangela Samarati and Marten van Sinderen and Sabrina De Capitani di Vimercati and Fons Wijnhoven}, title = {On Applying Boolean Masking to Exponents}, booktitle = {E-Business and Telecommunications - 18th International Conference, {ICETE} 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1795}, pages = {334--361}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-36840-0\_15}, doi = {10.1007/978-3-031-36840-0\_15}, timestamp = {Tue, 07 May 2024 20:08:51 +0200}, biburl = {https://dblp.org/rec/conf/icete/TunstallPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TunstallPP21, author = {Michael Tunstall and Louiza Papachristodoulou and Kostas Papagiannopoulos}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Boolean Exponent Splitting}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {321--332}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010570903210332}, doi = {10.5220/0010570903210332}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TunstallPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/YaoTMKS20, author = {Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Augmenting Leakage Detection Using Bootstrapping}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {104--119}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_6}, doi = {10.1007/978-3-030-68773-1\_6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/YaoTMKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoTMKS20, author = {Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont}, title = {Augmenting Leakage Detection using Bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2020}, url = {https://eprint.iacr.org/2020/508}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoTMKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerMT20, author = {Lauren De Meyer and Elke De Mulder and Michael Tunstall}, title = {On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1297}, year = {2020}, url = {https://eprint.iacr.org/2020/1297}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MeyerMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaCPST19, author = {Lejla Batina and Lukasz Chmielewski and Louiza Papachristodoulou and Peter Schwabe and Michael Tunstall}, title = {Online template attacks}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {21--36}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0171-8}, doi = {10.1007/S13389-017-0171-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaCPST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HutterT19, author = {Michael Hutter and Michael Tunstall}, title = {Constant-time higher-order Boolean-to-arithmetic masking}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {173--184}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0191-z}, doi = {10.1007/S13389-018-0191-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HutterT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TunstallPP18, author = {Michael Tunstall and Louiza Papachristodoulou and Kostas Papagiannopoulos}, title = {Boolean Exponent Splitting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1226}, year = {2018}, url = {https://eprint.iacr.org/2018/1226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TunstallPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/Tunstall17, author = {Michael Tunstall}, editor = {Keith Mayes and Konstantinos Markantonakis}, title = {Smart Card Security}, booktitle = {Smart Cards, Tokens, Security and Applications, Second Edition}, pages = {217--251}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-50500-8\_9}, doi = {10.1007/978-3-319-50500-8\_9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/17/Tunstall17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2016, editor = {Kerstin Lemke{-}Rust and Michael Tunstall}, title = {Smart Card Research and Advanced Applications - 15th International Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10146}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54669-8}, doi = {10.1007/978-3-319-54669-8}, isbn = {978-3-319-54668-1}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SaabLT16, author = {Sami Saab and Andrew Leiserson and Michael Tunstall}, title = {Key extraction from the primary side of a switched-mode power supply}, booktitle = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST 2016, Yilan, Taiwan, December 19-20, 2016}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsianHOST.2016.7835563}, doi = {10.1109/ASIANHOST.2016.7835563}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SaabLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TunstallG16, author = {Michael Tunstall and Gilbert Goodwill}, title = {Applying {TVLA} to Public Key Cryptographic Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2016}, url = {http://eprint.iacr.org/2016/513}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TunstallG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HutterT16, author = {Michael Hutter and Michael Tunstall}, title = {Constant-Time Higher-Order Boolean-to-Arithmetic Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2016}, url = {http://eprint.iacr.org/2016/1023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HutterT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TunstallJ15, author = {Michael Tunstall and Marc Joye}, title = {The distributions of individual bits in the output of multiplicative operations}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {71--90}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0110-9}, doi = {10.1007/S12095-014-0110-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TunstallJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GaleaMPT15, author = {Jake Longo and Elke De Mulder and Dan Page and Michael Tunstall}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {SoC It to {EM:} ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {620--640}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_31}, doi = {10.1007/978-3-662-48324-4\_31}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GaleaMPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HanleyKT15, author = {Neil Hanley and HeeSeok Kim and Michael Tunstall}, editor = {Kaisa Nyberg}, title = {Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {431--448}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_23}, doi = {10.1007/978-3-319-16715-2\_23}, timestamp = {Thu, 14 Oct 2021 10:27:48 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HanleyKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LeTT15, author = {Duc{-}Phong Le and Chik How Tan and Michael Tunstall}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Randomizing the Montgomery Powering Ladder}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {169--184}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_11}, doi = {10.1007/978-3-319-24018-3\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/LeTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SaabLT15, author = {Sami Saab and Andrew Leiserson and Michael Tunstall}, title = {Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2015}, url = {http://eprint.iacr.org/2015/512}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SaabLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaleaMPT15, author = {Jake Longo and Elke De Mulder and Daniel Page and Michael Tunstall}, title = {SoC it to {EM:} electromagnetic side-channel attacks on a complex system-on-chip}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2015}, url = {http://eprint.iacr.org/2015/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaleaMPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeTT15, author = {Duc{-}Phong Le and Chik How Tan and Michael Tunstall}, title = {Randomizing the Montgomery Powering Ladder}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2015}, url = {http://eprint.iacr.org/2015/657}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/McEvoyTWMM14, author = {Robert P. McEvoy and Michael Tunstall and Claire Whelan and Colin C. Murphy and William P. Marnane}, title = {All-or-Nothing Transforms as a countermeasure to differential side-channel analysis}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {3}, pages = {291--304}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0212-y}, doi = {10.1007/S10207-013-0212-Y}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/McEvoyTWMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GaleaMOPST14, author = {Jake Longo and Daniel P. Martin and Elisabeth Oswald and Daniel Page and Martijn Stam and Michael Tunstall}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Simulatable Leakage: Analysis, Pitfalls, and New Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {223--242}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_12}, doi = {10.1007/978-3-662-45611-8\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GaleaMOPST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BatinaCPST14, author = {Lejla Batina and Lukasz Chmielewski and Louiza Papachristodoulou and Peter Schwabe and Michael Tunstall}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {Online Template Attacks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {21--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_2}, doi = {10.1007/978-3-319-13039-2\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/BatinaCPST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sips/HanleyOTM14, author = {Neil Hanley and M{\'{a}}ire O'Neill and Michael Tunstall and William P. Marnane}, title = {Empirical evaluation of multi-device profiling side-channel attacks}, booktitle = {2014 {IEEE} Workshop on Signal Processing Systems, SiPS 2014, Belfast, United Kingdom, October 20-22, 2014}, pages = {226--231}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SiPS.2014.6986091}, doi = {10.1109/SIPS.2014.6986091}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sips/HanleyOTM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/Tunstall14, author = {Michael Tunstall}, editor = {Konstantinos Markantonakis and Keith Mayes}, title = {Smart Card Security}, booktitle = {Secure Smart Embedded Devices, Platforms and Applications}, pages = {145--177}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7915-4\_7}, doi = {10.1007/978-1-4614-7915-4\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/14/Tunstall14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AliMT13, author = {Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Differential fault analysis of {AES:} towards reaching its limits}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {2}, pages = {73--97}, year = {2013}, url = {https://doi.org/10.1007/s13389-012-0046-y}, doi = {10.1007/S13389-012-0046-Y}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/AliMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/TunstallWO13, author = {Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald}, editor = {Shiho Moriai}, title = {Masking Tables - An Underestimated Security Risk}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {425--444}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_22}, doi = {10.1007/978-3-662-43933-3\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/TunstallWO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TunstallWO13, author = {Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald}, title = {Masking Tables - An Underestimated Security Risk}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {735}, year = {2013}, url = {http://eprint.iacr.org/2013/735}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TunstallWO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AvanziHPT12, author = {Roberto Avanzi and Simon Hoerder and Dan Page and Michael Tunstall}, title = {Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {75}, year = {2012}, url = {https://doi.org/10.1007/s13389-011-0026-7}, doi = {10.1007/S13389-011-0026-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AvanziHPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MossOPT12, author = {Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Compiler Assisted Masking}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {58--75}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_4}, doi = {10.1007/978-3-642-33027-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MossOPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/JarvinenBPT12, author = {Kimmo J{\"{a}}rvinen and C{\'{e}}line Blondeau and Dan Page and Michael Tunstall}, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes}, booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, pages = {72--82}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FDTC.2012.13}, doi = {10.1109/FDTC.2012.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/JarvinenBPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/GierlichsST12, author = {Benedikt Gierlichs and J{\"{o}}rn{-}Marc Schmidt and Michael Tunstall}, editor = {Alejandro Hevia and Gregory Neven}, title = {Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7533}, pages = {305--321}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33481-8\_17}, doi = {10.1007/978-3-642-33481-8\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/GierlichsST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Tunstall12, author = {Michael Tunstall}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Improved "Partial Sums"-based Square Attack on {AES}}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {25--34}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 07 Nov 2017 12:02:58 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Tunstall12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/364229655, editor = {Marc Joye and Michael Tunstall}, title = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7}, doi = {10.1007/978-3-642-29656-7}, isbn = {978-3-642-29655-0}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/364229655.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tunstall12, author = {Michael Tunstall}, title = {Improved "Partial Sums"-based Square Attack on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2012}, url = {http://eprint.iacr.org/2012/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tunstall12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliMT12, author = {Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Differential Fault Analysis of {AES:} Towards Reaching its Limits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2012}, url = {http://eprint.iacr.org/2012/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanleyKT12, author = {Neil Hanley and HeeSeok Kim and Michael Tunstall}, title = {Exploiting Collisions in Addition Chain-based Exponentiation Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2012}, url = {http://eprint.iacr.org/2012/485}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanleyKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GierlichsST12, author = {Benedikt Gierlichs and J{\"{o}}rn{-}Marc Schmidt and Michael Tunstall}, title = {Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2012}, url = {http://eprint.iacr.org/2012/678}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GierlichsST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HanleyTM11, author = {Neil Hanley and Michael Tunstall and William P. Marnane}, title = {Using templates to distinguish multiplications from squaring operations}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {4}, pages = {255--266}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0135-4}, doi = {10.1007/S10207-011-0135-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HanleyTM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Tunstall11, author = {Michael Tunstall}, title = {Practical complexity differential cryptanalysis and fault analysis of {AES}}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {219--230}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0018-7}, doi = {10.1007/S13389-011-0018-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Tunstall11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AvanziHPT11, author = {Roberto Avanzi and Simon Hoerder and Dan Page and Michael Tunstall}, title = {Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {271--281}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0024-9}, doi = {10.1007/S13389-011-0024-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/AvanziHPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AmarilliMNPRT11, author = {Antoine Amarilli and Sascha M{\"{u}}ller and David Naccache and Dan Page and Pablo Rauzy and Michael Tunstall}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Can Code Polymorphism Limit Information Leakage?}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {1--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_1}, doi = {10.1007/978-3-642-21040-2\_1}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/AmarilliMNPRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/TunstallMA11, author = {Michael Tunstall and Debdeep Mukhopadhyay and Subidh Ali}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {224--233}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_15}, doi = {10.1007/978-3-642-21040-2\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/TunstallMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infosechicomnet/2011, editor = {Marc Joye and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7011}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24586-2}, doi = {10.1007/978-3-642-24586-2}, isbn = {978-3-642-24585-5}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosechicomnet/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmarilliMNPRT11, author = {Antoine Amarilli and Sascha M{\"{u}}ller and David Naccache and Daniel Page and Pablo Rauzy and Michael Tunstall}, title = {Can Code Polymorphism Limit Information Leakage?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2011}, url = {http://eprint.iacr.org/2011/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmarilliMNPRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanleyTM11, author = {Neil Hanley and Michael Tunstall and William P. Marnane}, title = {Using Templates to Distinguish Multiplications from Squaring Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2011}, url = {http://eprint.iacr.org/2011/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanleyTM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MossOPT11, author = {Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall}, title = {Automatic Insertion of {DPA} Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2011}, url = {http://eprint.iacr.org/2011/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MossOPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tunstall11, author = {Michael Tunstall}, title = {Practical Complexity Differential Cryptanalysis and Fault Analysis of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2011}, url = {http://eprint.iacr.org/2011/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tunstall11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GiraudKT10, author = {Christophe Giraud and Erik Woodward Knudsen and Michael Tunstall}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {Improved Fault Analysis of Signature Schemes}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {164--181}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_12}, doi = {10.1007/978-3-642-12510-2\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/GiraudKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TunstallJ10, author = {Michael Tunstall and Marc Joye}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Coordinate Blinding over Large Prime Fields}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {443--455}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_30}, doi = {10.1007/978-3-642-15031-9\_30}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/TunstallJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/SchmidtTAKKO10, author = {J{\"{o}}rn{-}Marc Schmidt and Michael Tunstall and Roberto Maria Avanzi and Ilya Kizhvatov and Timo Kasper and David F. Oswald}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {Combined Implementation Attack Resistant Exponentiation}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {305--322}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_19}, doi = {10.1007/978-3-642-14712-8\_19}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/SchmidtTAKKO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GallaisKT10, author = {Jean{-}Fran{\c{c}}ois Gallais and Ilya Kizhvatov and Michael Tunstall}, editor = {Yongwha Chung and Moti Yung}, title = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES} Implementations}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {243--257}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_18}, doi = {10.1007/978-3-642-17955-6\_18}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/GallaisKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2010, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9}, doi = {10.1007/978-3-642-12368-9}, isbn = {978-3-642-12367-2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GallaisKT10, author = {Jean{-}Fran{\c{c}}ois Gallais and Ilya Kizhvatov and Michael Tunstall}, title = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES} Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2010}, url = {http://eprint.iacr.org/2010/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GallaisKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvanziHPT10, author = {Roberto Maria Avanzi and Simon Hoerder and Daniel Page and Michael Tunstall}, title = {Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2010}, url = {http://eprint.iacr.org/2010/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvanziHPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliMT10, author = {Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Differential Fault Analysis of {AES} using a Single Multiple-Byte Fault}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2010}, url = {http://eprint.iacr.org/2010/636}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MarkantonakisTHAM09, author = {Konstantinos Markantonakis and Michael Tunstall and Gerhard P. Hancke and Ioannis G. Askoxylakis and Keith Mayes}, title = {Attacking smart card systems: Theory and practice}, journal = {Inf. Secur. Tech. Rep.}, volume = {14}, number = {2}, pages = {46--56}, year = {2009}, url = {https://doi.org/10.1016/j.istr.2009.06.001}, doi = {10.1016/J.ISTR.2009.06.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MarkantonakisTHAM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/McEvoyMMT09, author = {Robert P. McEvoy and Colin C. Murphy and William P. Marnane and Michael Tunstall}, title = {Isolated {WDDL:} {A} Hiding Countermeasure for Differential Power Analysis on FPGAs}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {2}, number = {1}, pages = {3:1--3:23}, year = {2009}, url = {https://doi.org/10.1145/1502781.1502784}, doi = {10.1145/1502781.1502784}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/McEvoyMMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Tunstall09, author = {Michael Tunstall}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Random Order m-ary Exponentiation}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {437--451}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_30}, doi = {10.1007/978-3-642-02620-1\_30}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Tunstall09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/JoyeT09, author = {Marc Joye and Michael Tunstall}, editor = {Bart Preneel}, title = {Exponent Recoding and Regular Exponentiation Algorithms}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {334--349}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_21}, doi = {10.1007/978-3-642-02384-2\_21}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/JoyeT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GrossschadlOPT09, author = {Johann Gro{\ss}sch{\"{a}}dl and Elisabeth Oswald and Dan Page and Michael Tunstall}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {176--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_13}, doi = {10.1007/978-3-642-14423-3\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GrossschadlOPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HanleyTM09, author = {Neil Hanley and Michael Tunstall and William P. Marnane}, editor = {Heung Youl Youm and Moti Yung}, title = {Unknown Plaintext Template Attacks}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {148--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_12}, doi = {10.1007/978-3-642-10838-9\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HanleyTM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McEvoyTWMM09, author = {Robert P. McEvoy and Michael Tunstall and Claire Whelan and Colin C. Murphy and William P. Marnane}, title = {All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2009}, url = {http://eprint.iacr.org/2009/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McEvoyTWMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossschadlOPT09, author = {Johann Gro{\ss}sch{\"{a}}dl and Elisabeth Oswald and Dan Page and Michael Tunstall}, title = {Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2009}, url = {http://eprint.iacr.org/2009/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossschadlOPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TunstallM09, author = {Michael Tunstall and Debdeep Mukhopadhyay}, title = {Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {575}, year = {2009}, url = {http://eprint.iacr.org/2009/575}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TunstallM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AmielFTWM08, author = {Fr{\'{e}}d{\'{e}}ric Amiel and Benoit Feix and Michael Tunstall and Claire Whelan and William P. Marnane}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Distinguishing Multiplications from Squaring Operations}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {346--360}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_22}, doi = {10.1007/978-3-642-04159-4\_22}, timestamp = {Thu, 07 Sep 2023 13:44:11 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AmielFTWM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/NguyenT07, author = {Khanh Nguyen and Michael Tunstall}, editor = {Luca Breveglieri and Shay Gueron and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {Montgomery Multiplication with Redundancy Check}, booktitle = {Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, {FDTC} 2007: Vienna, Austria, 10 September 2007}, pages = {30--36}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FDTC.2007.4318982}, doi = {10.1109/FDTC.2007.4318982}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/NguyenT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JoyeT07, author = {Marc Joye and Michael Tunstall}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {Securing OpenSSL against Micro-Architectural Attacks}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {189--196}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JoyeT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/McEvoyTMM07, author = {Robert P. McEvoy and Michael Tunstall and Colin C. Murphy and William P. Marnane}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Differential Power Analysis of {HMAC} Based on SHA-2, and Countermeasures}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {317--332}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_23}, doi = {10.1007/978-3-540-77535-5\_23}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/McEvoyTMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/TunstallB07, author = {Michael Tunstall and Olivier Beno{\^{\i}}t}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Efficient Use of Random Delays in Embedded Software}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {27--38}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_3}, doi = {10.1007/978-3-540-72354-7\_3}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/TunstallB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/MarkantonakisMTSP07, author = {Constantinos Markantonakis and Keith Mayes and Michael Tunstall and Damien Sauveron and Fred Piper}, editor = {Nadia Nedjah and Ajith Abraham and Luiza de Macedo Mourelle}, title = {Smart Card Security}, booktitle = {Computational Intelligence in Information Assurance and Security}, series = {Studies in Computational Intelligence}, volume = {57}, pages = {201--233}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71078-3\_8}, doi = {10.1007/978-3-540-71078-3\_8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/sci/MarkantonakisMTSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/Bar-ElCNTW06, author = {Hagai Bar{-}El and Hamid Choukri and David Naccache and Michael Tunstall and Claire Whelan}, title = {The Sorcerer's Apprentice Guide to Fault Attacks}, journal = {Proc. {IEEE}}, volume = {94}, number = {2}, pages = {370--382}, year = {2006}, url = {https://doi.org/10.1109/JPROC.2005.862424}, doi = {10.1109/JPROC.2005.862424}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/Bar-ElCNTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FournierT06, author = {Jacques J. A. Fournier and Michael Tunstall}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Cache Based Power Analysis Attacks on {AES}}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {17--28}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_2}, doi = {10.1007/11780656\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FournierT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/AmielCT06, author = {Fr{\'{e}}d{\'{e}}ric Amiel and Christophe Clavier and Michael Tunstall}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {Fault Analysis of DPA-Resistant Algorithms}, booktitle = {Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4236}, pages = {223--236}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889700\_20}, doi = {10.1007/11889700\_20}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/AmielCT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TunstallMM06, author = {Michael Tunstall and Constantinos Markantonakis and Keith Mayes}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Inhibiting Card Sharing Attacks}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {239--251}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_17}, doi = {10.1007/11908739\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/TunstallMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenoitT06, author = {Olivier Beno{\^{\i}}t and Michael Tunstall}, title = {Efficient Use of Random Delays}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2006}, url = {http://eprint.iacr.org/2006/272}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenoitT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NaccacheNTW05, author = {David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan}, editor = {Serge Vaudenay}, title = {Experimenting with Faults, Lattices and the {DSA}}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {16--28}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_3}, doi = {10.1007/978-3-540-30580-4\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NaccacheNTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-ElCNTW04, author = {Hagai Bar{-}El and Hamid Choukri and David Naccache and Michael Tunstall and Claire Whelan}, title = {The Sorcerer's Apprentice Guide to Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2004}, url = {http://eprint.iacr.org/2004/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-ElCNTW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheNTW04, author = {David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan}, title = {Experimenting with Faults, Lattices and the {DSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2004}, url = {http://eprint.iacr.org/2004/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheNTW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/NaccacheT00, author = {David Naccache and Michael Tunstall}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {How to Explain Side-Channel Leakage to Your Kids}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {229--230}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_17}, doi = {10.1007/3-540-44499-8\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/NaccacheT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MRaihiNT00, author = {David M'Ra{\"{\i}}hi and David Naccache and Michael Tunstall}, editor = {Yair Frankel}, title = {Asymmetric Currency Rounding}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {192--201}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_14}, doi = {10.1007/3-540-45472-1\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/MRaihiNT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.