Follow
XIN YE
Title
Cited by
Cited by
Year
Bounded, yet sufficient? How to determine whether limited side channel information enables key recovery
X Ye, T Eisenbarth, W Martin
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
452015
Balanced encoding to mitigate power analysis: a case study
C Chen, T Eisenbarth, A Shahverdi, X Ye
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
402015
On the vulnerability of low entropy masking schemes
X Ye, T Eisenbarth
International Conference on Smart Card Research and Advanced Applications, 44-60, 2013
342013
Faster hash-based signatures with bounded leakage
T Eisenbarth, I Von Maurich, X Ye
Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014
212014
A performance boost for hash-based signatures
T Eisenbarth, I Von Maurich, C Paar, X Ye
Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the …, 2013
82013
Non-linear collision analysis
X Ye, C Chen, T Eisenbarth
Radio Frequency Identification: Security and Privacy Issues: 10th …, 2014
72014
Wide collisions in practice
X Ye, T Eisenbarth
Applied Cryptography and Network Security: 10th International Conference …, 2012
62012
Side Channel Leakage Analysis
X Ye
Worcester Polytechnic Institute, 2014
42014
What cybersecurity Standard Work Is Applicable to Commercial Vehicles?
L Boran, X Ye
Cybersecurity for Commercial Vehicles, 2018
2018
Faster Leakage Detection and Exploitation
X Ye, M Taha, C Chen, T Eisenbarth
Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–10