Daniel Dinu

According to our database1, Daniel Dinu authored at least 20 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Invited: Pre-silicon Side Channel and Fault Analysis.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

2021
Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications.
RFC, September, 2021

Where Star Wars Meets Star Trek: SABER and Dilithium on the Same Polynomial Multiplier.
IACR Cryptol. ePrint Arch., 2021

2019
Triathlon of lightweight block ciphers for the Internet of things.
J. Cryptogr. Eng., 2019

A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things.
Proceedings of the Information Security Theory and Practice, 2019

SIA: Secure Intermittent Architecture for Off-the-Shelf Resource-Constrained Microcontrollers.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019

Secure Intermittent Computing Protocol: Protecting State Across Power Loss.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Efficient Implementation of the SHA-512 Hash Function for 8-Bit AVR Microcontrollers.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Secure Application Continuity in Intermittent Systems.
Proceedings of the Ninth International Green and Sustainable Computing Conference, 2018

2017
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors.
IACR Cryptol. ePrint Arch., 2017

Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares.
Proceedings of the Information Security - 20th International Conference, 2017

Optimal First-Order Boolean Masking for Embedded IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Side-Channel Attacks Meet Secure Network Protocols.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version).
IACR Cryptol. ePrint Arch., 2016

Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing.
IACR Cryptol. ePrint Arch., 2015


  Loading...