Bounded, yet sufficient? How to determine whether limited side channel information enables key recovery X Ye, T Eisenbarth, W Martin Smart Card Research and Advanced Applications: 13th International Conference …, 2015 | 45 | 2015 |
Balanced encoding to mitigate power analysis: a case study C Chen, T Eisenbarth, A Shahverdi, X Ye Smart Card Research and Advanced Applications: 13th International Conference …, 2015 | 40 | 2015 |
On the vulnerability of low entropy masking schemes X Ye, T Eisenbarth International Conference on Smart Card Research and Advanced Applications, 44-60, 2013 | 34 | 2013 |
Faster hash-based signatures with bounded leakage T Eisenbarth, I Von Maurich, X Ye Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014 | 21 | 2014 |
A performance boost for hash-based signatures T Eisenbarth, I Von Maurich, C Paar, X Ye Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the …, 2013 | 8 | 2013 |
Non-linear collision analysis X Ye, C Chen, T Eisenbarth Radio Frequency Identification: Security and Privacy Issues: 10th …, 2014 | 7 | 2014 |
Wide collisions in practice X Ye, T Eisenbarth Applied Cryptography and Network Security: 10th International Conference …, 2012 | 6 | 2012 |
Side Channel Leakage Analysis X Ye Worcester Polytechnic Institute, 2014 | 4 | 2014 |
What cybersecurity Standard Work Is Applicable to Commercial Vehicles? L Boran, X Ye Cybersecurity for Commercial Vehicles, 2018 | | 2018 |
Faster Leakage Detection and Exploitation X Ye, M Taha, C Chen, T Eisenbarth Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015 | | 2015 |