| 1 | 2012 | CHES | pc |
| 2 | 2011 | CHES | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2012 | Selecting Time Samples for Multivariate DPA Attacks | ches | 155-174 |
| 2 | 2012 | Theory and Practice of a Leakage Resilient Masking Scheme | asiacrypt | 758-775 |
| 3 | 2011 | To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order | ches | 143-159 |
| 4 | 2011 | Mutual Information Analysis: a Comprehensive Study | jofc | 269-291 |
| 5 | 2010 | The World Is Not Enough: Another Look on Second-Order DPA | asiacrypt | 112-129 |
| 6 | 2010 | The World is Not Enough: Another Look on Second-Order DPA | eprint | online |
| 7 | 2009 | Differential Cluster Analysis | ches | 112-127 |
| 8 | 2008 | Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration | ches | 346-362 |
| 9 | 2008 | Mutual Information Analysis | ches | 426-442 |
| 10 | 2007 | DPA-Resistance Without Routing Constraints? | ches | 107-120 |
| 11 | 2007 | Mutual Information Analysis -- A Universal Differential Side-Channel Attack | eprint | online |
| 12 | 2006 | Templates vs. Stochastic Methods | ches | online |