Author of the publication

Glitch Detection in Hardware Implementations on FPGAs Using Delay Based Sampling Techniques.

, , and . DSD, page 947-954. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process., , , , , , and . DATE, page 164-169. IEEE, (2021)State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks., , , and . PerCom Workshops, page 146-150. IEEE Computer Society, (2005)An Open-Source Platform for Evaluation of Hardware Implementations of Lightweight Authenticated Ciphers., , and . ReConFig, page 1-5. IEEE, (2019)Comparison of cost of protection against differential power analysis of selected authenticated ciphers., , , , and . HOST, page 147-152. IEEE Computer Society, (2018)Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks., , , , , and . ASHES@CCS, page 45-56. ACM, (2020)A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks., , , , and . INDOCRYPT, volume 13143 of Lecture Notes in Computer Science, page 224-245. Springer, (2021)Enhancing Information Security Courses With a Remotely Accessible Side-Channel Analysis Setup., , and . ACM Great Lakes Symposium on VLSI, page 531-536. ACM, (2022)A Configurable Ring-Oscillator-Based PUF for Xilinx FPGAs., , and . DSD, page 651-657. IEEE Computer Society, (2011)ATHENa - Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware Using FPGAs., , , , , and . FPL, page 414-421. IEEE Computer Society, (2010)Public Key Cryptography in Sensor Networks - Revisited., , and . ESAS, volume 3313 of Lecture Notes in Computer Science, page 2-18. Springer, (2004)