[go: up one dir, main page]

Follow
Daniel P. Martin
Daniel P. Martin
Camulos
Verified email at camulos.io
Title
Cited by
Cited by
Year
Counting keys in parallel after a side channel attack
DP Martin, JF O’connell, E Oswald, M Stam
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
912015
Authenticated encryption in the face of protocol and side channel leakage
G Barwell, DP Martin, E Oswald, M Stam
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
722017
Characterisation and estimation of the key rank distribution in the context of side channel evaluations
DP Martin, L Mather, E Oswald, M Stam
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
482016
Simulatable leakage: Analysis, pitfalls, and new constructions
J Longo, DP Martin, E Oswald, D Page, M Stam, MJ Tunstall
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
382014
Brief analysis of DeepSeek R1 and its implications for Generative AI
S Mercer, S Spillard, DP Martin
arXiv preprint arXiv:2502.02523, 2025
342025
A leakage resilient MAC
DP Martin, E Oswald, M Stam, M Wójcik
IMA International Conference on Cryptography and Coding, 295-310, 2015
332015
How low can you go? Using side-channel data to enhance brute-force key recovery.
J Longo, DP Martin, L Mather, E Oswald, B Sach, M Stam
IACR Cryptology ePrint Archive 2016, 609, 2016
262016
Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited
DP Martin, L Mather, E Oswald
Cryptographers’ Track at the RSA Conference, 394-412, 2018
252018
Quantum key search with side channel advice
DP Martin, A Montanaro, E Oswald, D Shepherd
International Conference on Selected Areas in Cryptography, 407-422, 2017
242017
The Dynamic k-Mismatch Problem
R Clifford, P Gawrychowski, T Kociumaka, DP Martin, P Uznański
arXiv preprint arXiv:2105.06166, 2021
132021
RLE edit distance in near optimal time
R Clifford, P Gawrychowski, T Kociumaka, DP Martin, P Uznański
arXiv preprint arXiv:1905.01254, 2019
102019
Dynamic shortest path and transitive closure algorithms: A survey
DP Martin
arXiv preprint arXiv:1709.00553, 2017
72017
A Note on Key Rank.
DP Martin, M Martinoli
IACR Cryptology ePrint Archive 2018, 614, 2018
42018
Client-oblivious OPRAM
GT Davies, C Janson, DP Martin
Information and Communications Security: 22nd International Conference …, 2020
32020
Applying Psychometrics to Large Language Model Simulated Populations: Recreating the HEXACO Personality Inventory Experiment with Generative Agents
S Mercer, DP Martin, P Swatton
arXiv preprint arXiv:2508.00742, 2025
12025
TimeCluster with PCA is Equivalent to Subspace Identification of Linear Dynamical Systems
CL Hines, S Spillard, DP Martin
arXiv preprint arXiv:2509.12895, 2025
2025
Leakage Resilient Symmetric Cryptography: Theory and Practice
DP Martin
University of Bristol, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–17