Daniel P. Martin

Orcid: 0000-0003-0417-1635

Affiliations:
  • Alan Turing Institute, London, UK
  • University of Bristol, UK (PhD 2016)


According to our database1, Daniel P. Martin authored at least 17 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
The Dynamic k-Mismatch Problem.
Proceedings of the 33rd Annual Symposium on Combinatorial Pattern Matching, 2022

2020
Client-oblivious OPRAM.
IACR Cryptol. ePrint Arch., 2020

2019
RLE Edit Distance in Near Optimal Time.
Proceedings of the 44th International Symposium on Mathematical Foundations of Computer Science, 2019

2018
A Note on Key Rank.
IACR Cryptol. ePrint Arch., 2018

Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
IACR Cryptol. ePrint Arch., 2018

2017
Quantum Key Search with Side Channel Advice.
IACR Cryptol. ePrint Arch., 2017

Authenticated Encryption in the Face of Protocol and Side Channel Leakage.
IACR Cryptol. ePrint Arch., 2017

Dynamic Shortest Path and Transitive Closure Algorithms: A Survey.
CoRR, 2017

2016
Leakage resilient symmetric cryptography: theory and practice.
PhD thesis, 2016

How low can you go? Using side-channel data to enhance brute-force key recovery.
IACR Cryptol. ePrint Arch., 2016

Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations.
IACR Cryptol. ePrint Arch., 2016

2015
How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack.
IACR Cryptol. ePrint Arch., 2015

A Leakage Resilient MAC.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Counting Keys in Parallel After a Side Channel Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Making and Breaking Leakage Simulators.
IACR Cryptol. ePrint Arch., 2014

Simulatable Leakage: Analysis, Pitfalls, and New Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
A Leakage Resilient MAC.
IACR Cryptol. ePrint Arch., 2013


  Loading...