From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A model of the leakage in the frequency domain and its application to CPA and DPA., , , , и . J. Cryptographic Engineering, 4 (3): 197-212 (2014)Circuit sizing method under delay constraint., , , и . ISCAS, IEEE, (2006)Statistical timing characterization., , , и . ISSoC, стр. 1-4. IEEE, (2012)Interest of MIA in frequency domain?, , , и . CS2@HiPEAC, стр. 35-38. ACM, (2015)Enhancing Electromagnetic Attacks Using Spectral Coherence Based Cartography., , , , и . VLSI-SoC, том 360 из IFIP Advances in Information and Communication Technology, стр. 135-155. Springer, (2009)Method for evaluation of transient-fault detection techniques., , , , и . Microelectron. Reliab., (2017)Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks., , , и . CARDIS, том 8419 из Lecture Notes in Computer Science, стр. 200-215. Springer, (2013)CMOS Gate Sizing under Delay Constraint., , , , и . PATMOS, том 2799 из Lecture Notes in Computer Science, стр. 60-69. Springer, (2003)Performance Metric Based Optimization Protocol., , , , и . PATMOS, том 3254 из Lecture Notes in Computer Science, стр. 100-109. Springer, (2004)Electromagnetic Fault Injection : How Faults Occur., , и . FDTC, стр. 9-16. IEEE, (2019)