BibTeX records: Michael Tunstall

download as .bib file

@inproceedings{DBLP:conf/icete/TunstallPP21,
  author       = {Michael Tunstall and
                  Louiza Papachristodoulou and
                  Kostas Papagiannopoulos},
  editor       = {Pierangela Samarati and
                  Marten van Sinderen and
                  Sabrina De Capitani di Vimercati and
                  Fons Wijnhoven},
  title        = {On Applying Boolean Masking to Exponents},
  booktitle    = {E-Business and Telecommunications - 18th International Conference,
                  {ICETE} 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1795},
  pages        = {334--361},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-36840-0\_15},
  doi          = {10.1007/978-3-031-36840-0\_15},
  timestamp    = {Tue, 07 May 2024 20:08:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/TunstallPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TunstallPP21,
  author       = {Michael Tunstall and
                  Louiza Papachristodoulou and
                  Kostas Papagiannopoulos},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Boolean Exponent Splitting},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {321--332},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010570903210332},
  doi          = {10.5220/0010570903210332},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TunstallPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/YaoTMKS20,
  author       = {Yuan Yao and
                  Michael Tunstall and
                  Elke De Mulder and
                  Anton Kochepasov and
                  Patrick Schaumont},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Augmenting Leakage Detection Using Bootstrapping},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_6},
  doi          = {10.1007/978-3-030-68773-1\_6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/YaoTMKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoTMKS20,
  author       = {Yuan Yao and
                  Michael Tunstall and
                  Elke De Mulder and
                  Anton Kochepasov and
                  Patrick Schaumont},
  title        = {Augmenting Leakage Detection using Bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/508},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoTMKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerMT20,
  author       = {Lauren De Meyer and
                  Elke De Mulder and
                  Michael Tunstall},
  title        = {On the Effect of the (Micro)Architecture on the Development of Side-Channel
                  Resistant Software},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1297},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1297},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BatinaCPST19,
  author       = {Lejla Batina and
                  Lukasz Chmielewski and
                  Louiza Papachristodoulou and
                  Peter Schwabe and
                  Michael Tunstall},
  title        = {Online template attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {21--36},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0171-8},
  doi          = {10.1007/S13389-017-0171-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BatinaCPST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HutterT19,
  author       = {Michael Hutter and
                  Michael Tunstall},
  title        = {Constant-time higher-order Boolean-to-arithmetic masking},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {173--184},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0191-z},
  doi          = {10.1007/S13389-018-0191-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HutterT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TunstallPP18,
  author       = {Michael Tunstall and
                  Louiza Papachristodoulou and
                  Kostas Papagiannopoulos},
  title        = {Boolean Exponent Splitting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1226},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TunstallPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/Tunstall17,
  author       = {Michael Tunstall},
  editor       = {Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Smart Card Security},
  booktitle    = {Smart Cards, Tokens, Security and Applications, Second Edition},
  pages        = {217--251},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-50500-8\_9},
  doi          = {10.1007/978-3-319-50500-8\_9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/17/Tunstall17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2016,
  editor       = {Kerstin Lemke{-}Rust and
                  Michael Tunstall},
  title        = {Smart Card Research and Advanced Applications - 15th International
                  Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10146},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54669-8},
  doi          = {10.1007/978-3-319-54669-8},
  isbn         = {978-3-319-54668-1},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SaabLT16,
  author       = {Sami Saab and
                  Andrew Leiserson and
                  Michael Tunstall},
  title        = {Key extraction from the primary side of a switched-mode power supply},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835563},
  doi          = {10.1109/ASIANHOST.2016.7835563},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SaabLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TunstallG16,
  author       = {Michael Tunstall and
                  Gilbert Goodwill},
  title        = {Applying {TVLA} to Public Key Cryptographic Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/513},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TunstallG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HutterT16,
  author       = {Michael Hutter and
                  Michael Tunstall},
  title        = {Constant-Time Higher-Order Boolean-to-Arithmetic Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1023},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HutterT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/TunstallJ15,
  author       = {Michael Tunstall and
                  Marc Joye},
  title        = {The distributions of individual bits in the output of multiplicative
                  operations},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {71--90},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0110-9},
  doi          = {10.1007/S12095-014-0110-9},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/TunstallJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GaleaMPT15,
  author       = {Jake Longo and
                  Elke De Mulder and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {SoC It to {EM:} ElectroMagnetic Side-Channel Attacks on a Complex
                  System-on-Chip},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {620--640},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_31},
  doi          = {10.1007/978-3-662-48324-4\_31},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GaleaMPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HanleyKT15,
  author       = {Neil Hanley and
                  HeeSeok Kim and
                  Michael Tunstall},
  editor       = {Kaisa Nyberg},
  title        = {Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms
                  Using a Single Trace},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {431--448},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_23},
  doi          = {10.1007/978-3-319-16715-2\_23},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HanleyKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LeTT15,
  author       = {Duc{-}Phong Le and
                  Chik How Tan and
                  Michael Tunstall},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Randomizing the Montgomery Powering Ladder},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_11},
  doi          = {10.1007/978-3-319-24018-3\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/LeTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaabLT15,
  author       = {Sami Saab and
                  Andrew Leiserson and
                  Michael Tunstall},
  title        = {Efficient Key Extraction from the Primary Side of a Switched-Mode
                  Power Supply},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/512},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaabLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaleaMPT15,
  author       = {Jake Longo and
                  Elke De Mulder and
                  Daniel Page and
                  Michael Tunstall},
  title        = {SoC it to {EM:} electromagnetic side-channel attacks on a complex
                  system-on-chip},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaleaMPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeTT15,
  author       = {Duc{-}Phong Le and
                  Chik How Tan and
                  Michael Tunstall},
  title        = {Randomizing the Montgomery Powering Ladder},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {657},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/657},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/McEvoyTWMM14,
  author       = {Robert P. McEvoy and
                  Michael Tunstall and
                  Claire Whelan and
                  Colin C. Murphy and
                  William P. Marnane},
  title        = {All-or-Nothing Transforms as a countermeasure to differential side-channel
                  analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {3},
  pages        = {291--304},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0212-y},
  doi          = {10.1007/S10207-013-0212-Y},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/McEvoyTWMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GaleaMOPST14,
  author       = {Jake Longo and
                  Daniel P. Martin and
                  Elisabeth Oswald and
                  Daniel Page and
                  Martijn Stam and
                  Michael Tunstall},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Simulatable Leakage: Analysis, Pitfalls, and New Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {223--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_12},
  doi          = {10.1007/978-3-662-45611-8\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GaleaMOPST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BatinaCPST14,
  author       = {Lejla Batina and
                  Lukasz Chmielewski and
                  Louiza Papachristodoulou and
                  Peter Schwabe and
                  Michael Tunstall},
  editor       = {Willi Meier and
                  Debdeep Mukhopadhyay},
  title        = {Online Template Attacks},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                  on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8885},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13039-2\_2},
  doi          = {10.1007/978-3-319-13039-2\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BatinaCPST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sips/HanleyOTM14,
  author       = {Neil Hanley and
                  M{\'{a}}ire O'Neill and
                  Michael Tunstall and
                  William P. Marnane},
  title        = {Empirical evaluation of multi-device profiling side-channel attacks},
  booktitle    = {2014 {IEEE} Workshop on Signal Processing Systems, SiPS 2014, Belfast,
                  United Kingdom, October 20-22, 2014},
  pages        = {226--231},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SiPS.2014.6986091},
  doi          = {10.1109/SIPS.2014.6986091},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sips/HanleyOTM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/Tunstall14,
  author       = {Michael Tunstall},
  editor       = {Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {Smart Card Security},
  booktitle    = {Secure Smart Embedded Devices, Platforms and Applications},
  pages        = {145--177},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7915-4\_7},
  doi          = {10.1007/978-1-4614-7915-4\_7},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/14/Tunstall14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AliMT13,
  author       = {Subidh Ali and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {Differential fault analysis of {AES:} towards reaching its limits},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {2},
  pages        = {73--97},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-012-0046-y},
  doi          = {10.1007/S13389-012-0046-Y},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/AliMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/TunstallWO13,
  author       = {Michael Tunstall and
                  Carolyn Whitnall and
                  Elisabeth Oswald},
  editor       = {Shiho Moriai},
  title        = {Masking Tables - An Underestimated Security Risk},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {425--444},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_22},
  doi          = {10.1007/978-3-662-43933-3\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/TunstallWO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TunstallWO13,
  author       = {Michael Tunstall and
                  Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {Masking Tables - An Underestimated Security Risk},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {735},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/735},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TunstallWO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AvanziHPT12,
  author       = {Roberto Avanzi and
                  Simon Hoerder and
                  Dan Page and
                  Michael Tunstall},
  title        = {Erratum to: Side-channel attacks on the McEliece and Niederreiter
                  public-key cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {75},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-011-0026-7},
  doi          = {10.1007/S13389-011-0026-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AvanziHPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MossOPT12,
  author       = {Andrew Moss and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Compiler Assisted Masking},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {58--75},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_4},
  doi          = {10.1007/978-3-642-33027-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MossOPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/JarvinenBPT12,
  author       = {Kimmo J{\"{a}}rvinen and
                  C{\'{e}}line Blondeau and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes},
  booktitle    = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  pages        = {72--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FDTC.2012.13},
  doi          = {10.1109/FDTC.2012.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/JarvinenBPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/GierlichsST12,
  author       = {Benedikt Gierlichs and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Michael Tunstall},
  editor       = {Alejandro Hevia and
                  Gregory Neven},
  title        = {Infective Computation and Dummy Rounds: Fault Protection for Block
                  Ciphers without Check-before-Output},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference
                  on Cryptology and Information Security in Latin America, Santiago,
                  Chile, October 7-10, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7533},
  pages        = {305--321},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33481-8\_17},
  doi          = {10.1007/978-3-642-33481-8\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/GierlichsST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Tunstall12,
  author       = {Michael Tunstall},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Improved "Partial Sums"-based Square Attack on {AES}},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {25--34},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Tunstall12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364229655,
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7},
  doi          = {10.1007/978-3-642-29656-7},
  isbn         = {978-3-642-29655-0},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/364229655.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tunstall12,
  author       = {Michael Tunstall},
  title        = {Improved "Partial Sums"-based Square Attack on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tunstall12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliMT12,
  author       = {Subidh Ali and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {Differential Fault Analysis of {AES:} Towards Reaching its Limits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanleyKT12,
  author       = {Neil Hanley and
                  HeeSeok Kim and
                  Michael Tunstall},
  title        = {Exploiting Collisions in Addition Chain-based Exponentiation Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanleyKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GierlichsST12,
  author       = {Benedikt Gierlichs and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Michael Tunstall},
  title        = {Infective Computation and Dummy Rounds: Fault Protection for Block
                  Ciphers without Check-before-Output},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/678},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GierlichsST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HanleyTM11,
  author       = {Neil Hanley and
                  Michael Tunstall and
                  William P. Marnane},
  title        = {Using templates to distinguish multiplications from squaring operations},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {4},
  pages        = {255--266},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0135-4},
  doi          = {10.1007/S10207-011-0135-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HanleyTM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Tunstall11,
  author       = {Michael Tunstall},
  title        = {Practical complexity differential cryptanalysis and fault analysis
                  of {AES}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {219--230},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0018-7},
  doi          = {10.1007/S13389-011-0018-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Tunstall11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AvanziHPT11,
  author       = {Roberto Avanzi and
                  Simon Hoerder and
                  Dan Page and
                  Michael Tunstall},
  title        = {Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {271--281},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0024-9},
  doi          = {10.1007/S13389-011-0024-9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/AvanziHPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AmarilliMNPRT11,
  author       = {Antoine Amarilli and
                  Sascha M{\"{u}}ller and
                  David Naccache and
                  Dan Page and
                  Pablo Rauzy and
                  Michael Tunstall},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Can Code Polymorphism Limit Information Leakage?},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_1},
  doi          = {10.1007/978-3-642-21040-2\_1},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/AmarilliMNPRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TunstallMA11,
  author       = {Michael Tunstall and
                  Debdeep Mukhopadhyay and
                  Subidh Ali},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Differential Fault Analysis of the Advanced Encryption Standard Using
                  a Single Fault},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {224--233},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_15},
  doi          = {10.1007/978-3-642-21040-2\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/TunstallMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infosechicomnet/2011,
  editor       = {Marc Joye and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {Security Aspects in Information Technology - First International Conference,
                  InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7011},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24586-2},
  doi          = {10.1007/978-3-642-24586-2},
  isbn         = {978-3-642-24585-5},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosechicomnet/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmarilliMNPRT11,
  author       = {Antoine Amarilli and
                  Sascha M{\"{u}}ller and
                  David Naccache and
                  Daniel Page and
                  Pablo Rauzy and
                  Michael Tunstall},
  title        = {Can Code Polymorphism Limit Information Leakage?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmarilliMNPRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanleyTM11,
  author       = {Neil Hanley and
                  Michael Tunstall and
                  William P. Marnane},
  title        = {Using Templates to Distinguish Multiplications from Squaring Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanleyTM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MossOPT11,
  author       = {Andrew Moss and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  title        = {Automatic Insertion of {DPA} Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MossOPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tunstall11,
  author       = {Michael Tunstall},
  title        = {Practical Complexity Differential Cryptanalysis and Fault Analysis
                  of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tunstall11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GiraudKT10,
  author       = {Christophe Giraud and
                  Erik Woodward Knudsen and
                  Michael Tunstall},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {Improved Fault Analysis of Signature Schemes},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_12},
  doi          = {10.1007/978-3-642-12510-2\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/GiraudKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TunstallJ10,
  author       = {Michael Tunstall and
                  Marc Joye},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Coordinate Blinding over Large Prime Fields},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {443--455},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_30},
  doi          = {10.1007/978-3-642-15031-9\_30},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/TunstallJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/SchmidtTAKKO10,
  author       = {J{\"{o}}rn{-}Marc Schmidt and
                  Michael Tunstall and
                  Roberto Maria Avanzi and
                  Ilya Kizhvatov and
                  Timo Kasper and
                  David F. Oswald},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {Combined Implementation Attack Resistant Exponentiation},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {305--322},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_19},
  doi          = {10.1007/978-3-642-14712-8\_19},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/SchmidtTAKKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GallaisKT10,
  author       = {Jean{-}Fran{\c{c}}ois Gallais and
                  Ilya Kizhvatov and
                  Michael Tunstall},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES}
                  Implementations},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_18},
  doi          = {10.1007/978-3-642-17955-6\_18},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/GallaisKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2010,
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9},
  doi          = {10.1007/978-3-642-12368-9},
  isbn         = {978-3-642-12367-2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GallaisKT10,
  author       = {Jean{-}Fran{\c{c}}ois Gallais and
                  Ilya Kizhvatov and
                  Michael Tunstall},
  title        = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES}
                  Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GallaisKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvanziHPT10,
  author       = {Roberto Maria Avanzi and
                  Simon Hoerder and
                  Daniel Page and
                  Michael Tunstall},
  title        = {Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvanziHPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliMT10,
  author       = {Subidh Ali and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {Differential Fault Analysis of {AES} using a Single Multiple-Byte
                  Fault},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/636},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MarkantonakisTHAM09,
  author       = {Konstantinos Markantonakis and
                  Michael Tunstall and
                  Gerhard P. Hancke and
                  Ioannis G. Askoxylakis and
                  Keith Mayes},
  title        = {Attacking smart card systems: Theory and practice},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {14},
  number       = {2},
  pages        = {46--56},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.istr.2009.06.001},
  doi          = {10.1016/J.ISTR.2009.06.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MarkantonakisTHAM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/McEvoyMMT09,
  author       = {Robert P. McEvoy and
                  Colin C. Murphy and
                  William P. Marnane and
                  Michael Tunstall},
  title        = {Isolated {WDDL:} {A} Hiding Countermeasure for Differential Power
                  Analysis on FPGAs},
  journal      = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {3:1--3:23},
  year         = {2009},
  url          = {https://doi.org/10.1145/1502781.1502784},
  doi          = {10.1145/1502781.1502784},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trets/McEvoyMMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Tunstall09,
  author       = {Michael Tunstall},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Random Order m-ary Exponentiation},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {437--451},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_30},
  doi          = {10.1007/978-3-642-02620-1\_30},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Tunstall09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/JoyeT09,
  author       = {Marc Joye and
                  Michael Tunstall},
  editor       = {Bart Preneel},
  title        = {Exponent Recoding and Regular Exponentiation Algorithms},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {334--349},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_21},
  doi          = {10.1007/978-3-642-02384-2\_21},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/JoyeT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GrossschadlOPT09,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Side-Channel Analysis of Cryptographic Software via Early-Terminating
                  Multiplications},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {176--192},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_13},
  doi          = {10.1007/978-3-642-14423-3\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GrossschadlOPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HanleyTM09,
  author       = {Neil Hanley and
                  Michael Tunstall and
                  William P. Marnane},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Unknown Plaintext Template Attacks},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_12},
  doi          = {10.1007/978-3-642-10838-9\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HanleyTM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McEvoyTWMM09,
  author       = {Robert P. McEvoy and
                  Michael Tunstall and
                  Claire Whelan and
                  Colin C. Murphy and
                  William P. Marnane},
  title        = {All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McEvoyTWMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossschadlOPT09,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  title        = {Side-Channel Analysis of Cryptographic Software via Early-Terminating
                  Multiplications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossschadlOPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TunstallM09,
  author       = {Michael Tunstall and
                  Debdeep Mukhopadhyay},
  title        = {Differential Fault Analysis of the Advanced Encryption Standard using
                  a Single Fault},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {575},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/575},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TunstallM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AmielFTWM08,
  author       = {Fr{\'{e}}d{\'{e}}ric Amiel and
                  Benoit Feix and
                  Michael Tunstall and
                  Claire Whelan and
                  William P. Marnane},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Distinguishing Multiplications from Squaring Operations},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {346--360},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_22},
  doi          = {10.1007/978-3-642-04159-4\_22},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AmielFTWM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/NguyenT07,
  author       = {Khanh Nguyen and
                  Michael Tunstall},
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Montgomery Multiplication with Redundancy Check},
  booktitle    = {Fourth International Workshop on Fault Diagnosis and Tolerance in
                  Cryptography, 2007, {FDTC} 2007: Vienna, Austria, 10 September 2007},
  pages        = {30--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FDTC.2007.4318982},
  doi          = {10.1109/FDTC.2007.4318982},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/NguyenT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JoyeT07,
  author       = {Marc Joye and
                  Michael Tunstall},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Securing OpenSSL against Micro-Architectural Attacks},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {189--196},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JoyeT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/McEvoyTMM07,
  author       = {Robert P. McEvoy and
                  Michael Tunstall and
                  Colin C. Murphy and
                  William P. Marnane},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Differential Power Analysis of {HMAC} Based on SHA-2, and Countermeasures},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {317--332},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_23},
  doi          = {10.1007/978-3-540-77535-5\_23},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/McEvoyTMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TunstallB07,
  author       = {Michael Tunstall and
                  Olivier Beno{\^{\i}}t},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Efficient Use of Random Delays in Embedded Software},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {27--38},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_3},
  doi          = {10.1007/978-3-540-72354-7\_3},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/TunstallB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/MarkantonakisMTSP07,
  author       = {Constantinos Markantonakis and
                  Keith Mayes and
                  Michael Tunstall and
                  Damien Sauveron and
                  Fred Piper},
  editor       = {Nadia Nedjah and
                  Ajith Abraham and
                  Luiza de Macedo Mourelle},
  title        = {Smart Card Security},
  booktitle    = {Computational Intelligence in Information Assurance and Security},
  series       = {Studies in Computational Intelligence},
  volume       = {57},
  pages        = {201--233},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71078-3\_8},
  doi          = {10.1007/978-3-540-71078-3\_8},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/sci/MarkantonakisMTSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/Bar-ElCNTW06,
  author       = {Hagai Bar{-}El and
                  Hamid Choukri and
                  David Naccache and
                  Michael Tunstall and
                  Claire Whelan},
  title        = {The Sorcerer's Apprentice Guide to Fault Attacks},
  journal      = {Proc. {IEEE}},
  volume       = {94},
  number       = {2},
  pages        = {370--382},
  year         = {2006},
  url          = {https://doi.org/10.1109/JPROC.2005.862424},
  doi          = {10.1109/JPROC.2005.862424},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/Bar-ElCNTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FournierT06,
  author       = {Jacques J. A. Fournier and
                  Michael Tunstall},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Cache Based Power Analysis Attacks on {AES}},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_2},
  doi          = {10.1007/11780656\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FournierT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/AmielCT06,
  author       = {Fr{\'{e}}d{\'{e}}ric Amiel and
                  Christophe Clavier and
                  Michael Tunstall},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Fault Analysis of DPA-Resistant Algorithms},
  booktitle    = {Fault Diagnosis and Tolerance in Cryptography, Third International
                  Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4236},
  pages        = {223--236},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889700\_20},
  doi          = {10.1007/11889700\_20},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/AmielCT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TunstallMM06,
  author       = {Michael Tunstall and
                  Constantinos Markantonakis and
                  Keith Mayes},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Inhibiting Card Sharing Attacks},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {239--251},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_17},
  doi          = {10.1007/11908739\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/TunstallMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenoitT06,
  author       = {Olivier Beno{\^{\i}}t and
                  Michael Tunstall},
  title        = {Efficient Use of Random Delays},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenoitT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NaccacheNTW05,
  author       = {David Naccache and
                  Phong Q. Nguyen and
                  Michael Tunstall and
                  Claire Whelan},
  editor       = {Serge Vaudenay},
  title        = {Experimenting with Faults, Lattices and the {DSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_3},
  doi          = {10.1007/978-3-540-30580-4\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NaccacheNTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-ElCNTW04,
  author       = {Hagai Bar{-}El and
                  Hamid Choukri and
                  David Naccache and
                  Michael Tunstall and
                  Claire Whelan},
  title        = {The Sorcerer's Apprentice Guide to Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-ElCNTW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheNTW04,
  author       = {David Naccache and
                  Phong Q. Nguyen and
                  Michael Tunstall and
                  Claire Whelan},
  title        = {Experimenting with Faults, Lattices and the {DSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheNTW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/NaccacheT00,
  author       = {David Naccache and
                  Michael Tunstall},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {How to Explain Side-Channel Leakage to Your Kids},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {229--230},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_17},
  doi          = {10.1007/3-540-44499-8\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/NaccacheT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MRaihiNT00,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache and
                  Michael Tunstall},
  editor       = {Yair Frankel},
  title        = {Asymmetric Currency Rounding},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {192--201},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_14},
  doi          = {10.1007/3-540-45472-1\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/MRaihiNT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics