Daniel P. Martin
Daniel P. Martin
Senior Data Scientist, The Alan Turing Institute
Verified email at turing.ac.uk
Title
Cited by
Cited by
Year
Counting keys in parallel after a side channel attack
DP Martin, JF O’connell, E Oswald, M Stam
International Conference on the Theory and Application of Cryptology and …, 2015
592015
Authenticated encryption in the face of protocol and side channel leakage
G Barwell, DP Martin, E Oswald, M Stam
International Conference on the Theory and Application of Cryptology and …, 2017
382017
Characterisation and estimation of the key rank distribution in the context of side channel evaluations
DP Martin, L Mather, E Oswald, M Stam
International Conference on the Theory and Application of Cryptology and …, 2016
292016
A leakage resilient MAC
DP Martin, E Oswald, M Stam, M Wójcik
IMA International Conference on Cryptography and Coding, 295-310, 2015
262015
Simulatable leakage: Analysis, pitfalls, and new constructions
J Longo, DP Martin, E Oswald, D Page, M Stam, MJ Tunstall
International Conference on the Theory and Application of Cryptology and …, 2014
262014
Quantum key search with side channel advice
DP Martin, A Montanaro, E Oswald, D Shepherd
International Conference on Selected Areas in Cryptography, 407-422, 2017
152017
Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited
DP Martin, L Mather, E Oswald
Cryptographers’ Track at the RSA Conference, 394-412, 2018
132018
How low can you go? Using side-channel data to enhance brute-force key recovery.
J Longo, DP Martin, L Mather, E Oswald, B Sach, M Stam
IACR Cryptology ePrint Archive 2016, 609, 2016
102016
Dynamic shortest path and transitive closure algorithms: A survey
DP Martin
arXiv preprint arXiv:1709.00553, 2017
42017
A Note on Key Rank.
DP Martin, M Martinoli
IACR Cryptology ePrint Archive 2018, 614, 2018
22018
RLE edit distance in near optimal time
R Clifford, P Gawrychowski, T Kociumaka, DP Martin, P Uznański
arXiv preprint arXiv:1905.01254, 2019
12019
Client-oblivious OPRAM
GT Davies, C Janson, DP Martin
International Conference on Information and Communications Security, 312-330, 2020
2020
Leakage Resilient Symmetric Cryptography: Theory and Practice
DP Martin
University of Bristol, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–13