Author of the publication

Revealing side-channel issues of complex circuits by enhanced leakage models.

, , and . DATE, page 1179-1184. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis., , , and . IACR Cryptology ePrint Archive, (2018)CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis., , , , , and . IEEE Trans. Computers, 68 (3): 347-361 (2019)Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , and . IACR Cryptology ePrint Archive, (2017)Profiled SCA with a New Twist: Semi-supervised Learning., , , , and . IACR Cryptology ePrint Archive, (2017)On the Performance of Convolutional Neural Networks for Side-Channel Analysis., , , , , and . SPACE, volume 11348 of Lecture Notes in Computer Science, page 157-176. Springer, (2018)On What to Learn: Train or Adapt a Deeply Learned Profile?, , and . IACR Cryptol. ePrint Arch., (2020)On the optimality and practicability of mutual information analysis in some scenarios., , , and . Cryptogr. Commun., 10 (1): 101-121 (2018)Trace-to-Trace Translation for SCA., , and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 24-43. Springer, (2021)Detecting Hidden Leakages., , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 324-342. Springer, (2014)ULTRA: Ultimate Rootkit Detection over the Air., , and . RAID, page 232-251. ACM, (2022)