| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IACR Trans. Cryptogr. Hardw. Embed. Syst.
|
| 2026 | J | jnl |
IACR Commun. Cryptol.
|
| 2025 | J | jnl |
J. Cryptogr. Eng.
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | — | conf |
ISMVL
|
| 2025 | — | conf |
ISMVL
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | — | conf |
ISMVL
|
| 2025 | B | conf |
ETS
|
| 2025 | C | conf |
ISCAS
|
| 2025 | J | jnl |
Side-Channel and Fault Injection Attacks on VOLEitH Signature Schemes: A Case Study of Masked FAEST.
IACR Cryptol. ePrint Arch.
|
| 2025 | — | conf |
QRSEC@CCS
|
| 2025 | — | conf |
ISMVL
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | — | conf |
ACNS (3)
|
| 2024 | C | conf |
A Single-Trace Fault Injection Attack on Hedged Module Lattice Digital Signature Algorithm (ML-DSA).
FDTC
|
| 2024 | — | conf |
HOST
|
| 2024 | C | conf |
DSD
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | J | jnl |
IACR Commun. Cryptol.
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | J | jnl |
IEEE Des. Test
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | J | jnl |
IACR Commun. Cryptol.
|
| 2023 | B | conf |
TrustCom
|
| 2023 | — | conf |
A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber's Encapsulation Algorithm.
FPS (1)
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2023 | B | conf |
ETS
|
| 2023 | — | conf |
ASHES@CCS
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2023 | — | conf |
C2SI
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2023 | J | jnl |
J. Cryptogr. Eng.
|
| 2023 | C | conf |
ISCAS
|
| 2023 | — | conf |
APKC@AsiaCCS
|
| 2023 | J | jnl |
J. Hardw. Syst. Secur.
|
| 2023 | — | conf |
ISMVL
|
| 2023 | — | conf |
IPDPS Workshops
|
| 2023 | — | conf |
ACNS Workshops
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | Misc | conf |
ICISC
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | — | conf |
FPS
|
| 2022 | B | conf |
ETS
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | C | conf |
DSD
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | — | conf |
ACM Great Lakes Symposium on VLSI
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | C | conf |
VLSI-SoC
|
| 2021 | J | jnl |
IACR Trans. Cryptogr. Hardw. Embed. Syst.
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | — | conf |
CPSS@AsiaCCS
|
| 2021 | — | conf |
ISMVL
|
| 2021 | — | conf |
ASHES@CCS
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | J | jnl |
IEEE Trans. Circuits Syst. II Express Briefs
|
| 2021 | J | jnl |
SN Comput. Sci.
|
| 2020 | C | conf |
ICCD
|
| 2020 | A | conf |
DATE
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | C | conf |
VLSI-SOC
|
| 2020 | — | conf |
HASP@MICRO
|
| 2020 | — | conf |
ASHES@CCS
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | Misc | conf |
ICISC
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | C | conf |
CARDIS
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | — | conf |
ISMVL
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | — | conf |
iSES
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | — | conf |
EuroS&P Workshops
|
| 2019 | — | conf |
NORCAS
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | — | conf |
ISMVL
|
| 2018 | — | conf |
ISMVL
|
| 2018 | — | conf |
HOST
|
| 2018 | — | conf |
NEWCAS
|
| 2018 | — | conf |
NEWCAS
|
| 2018 | — | conf |
WISEC
|
| 2018 | J | jnl |
Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test.
Cryptogr. Commun.
|
| 2018 | — | conf |
NORCAS
|
| 2018 | — | conf |
NORCAS
|
| 2018 | — | conf |
WISEC
|
| 2017 | J | jnl |
Cryptogr. Commun.
|
| 2017 | J | jnl |
Int. J. Circuit Theory Appl.
|
| 2017 | — | conf |
CS2@HiPEAC
|
| 2017 | — | conf |
ISMVL
|
| 2017 | A | conf |
DATE
|
| 2017 | J | jnl |
J. Signal Process. Syst.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | — | conf |
MobiMedia
|
| 2016 | — | conf |
ISMVL
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | — | conf |
MobiMedia
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | — | conf |
CNS
|
| 2015 | A | conf |
DATE
|
| 2015 | — | conf |
TrustCom/BigDataSE/ISPA (1)
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
Enterp. Inf. Syst.
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
CoRR
|
| 2014 | — | conf |
An Algorithm for Constructing a Minimal Register with Non-linear Update Generating a Given Sequence.
ISMVL
|
| 2014 | C | conf |
SETA
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | — | conf |
NORCHIP
|
| 2014 | J | jnl |
Microprocess. Microsystems
|
| 2014 | — | conf |
NORCHIP
|
| 2014 | — | conf |
NORCHIP
|
| 2014 | J | jnl |
Des. Codes Cryptogr.
|
| 2014 | — | conf |
ISSoC
|
| 2014 | B | conf |
ETS
|
| 2014 | — | conf |
ASP-DAC
|
| 2013 | J | jnl |
J. Multiple Valued Log. Soft Comput.
|
| 2013 | C | conf |
DSD
|
| 2013 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
RFIDSec
|
| 2013 | C | conf |
DSD
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
ACM Great Lakes Symposium on VLSI
|
| 2013 | Misc | conf |
ICISC
|
| 2013 | — | conf |
ISMVL
|
| 2012 | — | conf |
ISMVL
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | — | conf |
COSADE
|
| 2012 | Misc | conf |
ICISC
|
| 2012 | J | jnl |
J. Multiple Valued Log. Soft Comput.
|
| 2012 | C | conf |
Power-security trade-off in multi-level power analysis countermeasures for FSR-based stream ciphers.
ISCAS
|
| 2012 | J | jnl |
CoRR
|
| 2012 | C | conf |
ICCD
|
| 2012 | — | conf |
CompleNet
|
| 2011 | J | jnl |
IEEE ACM Trans. Comput. Biol. Bioinform.
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | — | conf |
ACM Great Lakes Symposium on VLSI
|
| 2011 | J | jnl |
CoRR
|
| 2011 | C | conf |
ICCD
|
| 2011 | — | conf |
ACM Great Lakes Symposium on VLSI
|
| 2011 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2011 | J | jnl |
CoRR
|
| 2011 | A | conf |
ICCAD
|
| 2010 | C | conf |
SETA
|
| 2010 | C | conf |
DSD
|
| 2010 | — | conf |
ISMVL
|
| 2010 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2010 | C | conf |
ICCD
|
| 2010 | J | jnl |
CoRR
|
| 2009 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
Finding matching initial states for equivalent NLFSRs in the fibonacci and the galois configurations
CoRR
|
| 2009 | A | conf |
DATE
|
| 2008 | J | jnl |
Trans. Comp. Sys. Biology
|
| 2008 | J | jnl |
CoRR
|
| 2008 | — | conf |
BIONETICS
|
| 2008 | A | conf |
DATE
|
| 2008 | — | conf |
IWSOS
|
| 2007 | — | conf |
BIONETICS
|
| 2007 | — | conf |
ISMVL
|
| 2006 | — | conf |
ISMVL
|
| 2005 | — | conf |
ASP-DAC
|
| 2005 | A | conf |
DATE
|
| 2005 | A | conf |
DATE
|
| 2005 | J | jnl |
IEEE Trans. Computers
|
| 2005 | C | conf |
IADIS AC
|
| 2005 | — | conf |
ASP-DAC
|
| 2005 | A | conf |
ICCAD
|
| 2005 | — | conf |
ISCAS (3)
|
| 2005 | — | conf |
ASP-DAC
|
| 2005 | A | conf |
DATE
|
| 2004 | — | conf |
ISMVL
|
| 2004 | — | conf |
ASP-DAC
|
| 2004 | A | conf |
ICCAD
|
| 2004 | — | conf |
ISCAS (4)
|
| 2004 | J | jnl |
J. Multiple Valued Log. Soft Comput.
|
| 2003 | — | conf |
ASP-DAC
|
| 2003 | C | conf |
ICCD
|
| 2003 | — | conf |
ISMVL
|
| 2003 | — | conf |
ISMVL
|
| 2002 | — | conf |
ISMVL
|
| 2002 | — | conf |
IWLS
|
| 2002 | — | conf |
IWLS
|
| 2002 | A | conf |
DATE
|
| 2002 | — | conf |
DFT
|
| 2002 | — | conf |
IWLS
|
| 2001 | — | conf |
ISMVL
|
| 2001 | — | conf |
MSE
|
| 2000 | J | jnl |
IEEE Trans. Computers
|
| 2000 | J | jnl |
IEEE Trans. Computers
|
| 2000 | — | conf |
ISMVL
|
| 2000 | — | conf |
ISMVL
|
| 2000 | A | conf |
DATE
|
| 1999 | — | conf |
ISMVL
|
| 1999 | J | jnl |
Mod-p Decision Diagrams: A Data Structure for Multiple-Valued Functions.
Universität Trier, Mathematik/Informatik, Forschungsbericht
|
| 1999 | J | jnl |
Probabilistic Verification of Multiple-Valued Functions
Universität Trier, Mathematik/Informatik, Forschungsbericht
|
| 1997 | — | — |
|
| 1997 | — | conf |
ISMVL
|
| 1996 | — | conf |
ISMVL
|
| 1995 | — | conf |
ISMVL
|
| 1994 | — | conf |
ISMVL
|