2007 |
10 | EE | Khanh Nguyen,
Michael Tunstall:
Montgomery Multiplication with Redundancy Check.
FDTC 2007: 30-36 |
9 | EE | Robert P. McEvoy,
Michael Tunstall,
Colin C. Murphy,
William P. Marnane:
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.
WISA 2007: 317-332 |
8 | EE | Michael Tunstall,
Olivier Benoît:
Efficient Use of Random Delays in Embedded Software.
WISTP 2007: 27-38 |
7 | EE | Constantinos Markantonakis,
Keith Mayes,
Michael Tunstall,
Damien Sauveron,
Fred Piper:
Smart Card Security.
Computational Intelligence in Information Assurance and Security 2007: 201-233 |
2006 |
6 | EE | Jacques J. A. Fournier,
Michael Tunstall:
Cache Based Power Analysis Attacks on AES.
ACISP 2006: 17-28 |
5 | EE | Frederic Amiel,
Christophe Clavier,
Michael Tunstall:
Fault Analysis of DPA-Resistant Algorithms.
FDTC 2006: 223-236 |
4 | EE | Michael Tunstall,
Constantinos Markantonakis,
Keith Mayes:
Inhibiting Card Sharing Attacks.
IWSEC 2006: 239-251 |
2005 |
3 | EE | David Naccache,
Phong Q. Nguyen,
Michael Tunstall,
Claire Whelan:
Experimenting with Faults, Lattices and the DSA.
Public Key Cryptography 2005: 16-28 |
2000 |
2 | EE | David Naccache,
Michael Tunstall:
How to Explain Side-Channel Leakage to Your Kids.
CHES 2000: 229-230 |
1 | EE | David M'Raïhi,
David Naccache,
Michael Tunstall:
Asymmetric Currency Rounding.
Financial Cryptography 2000: 192-201 |