Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis., , , , , and . NDSS, The Internet Society, (2020)A Brain-Computer Interface Framework Based on Compressive Sensing and Deep Learning., , , , , and . IEEE Consumer Electron. Mag., 9 (3): 90-96 (2020)Fast Qubit Placement in 2D Architecture Using Nearest Neighbor Realization., , and . iNIS, page 95-100. IEEE, (2015)An FPGA-Based Brain Computer Interfacing Using Compressive Sensing and Machine Learning., , and . ISVLSI, page 726-731. IEEE Computer Society, (2018)Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis., , , , , and . IACR Cryptology ePrint Archive, (2019)Side-Channel Evaluation Methodology on Software., , , , , and . Cryptogr., 4 (4): 27 (2020)From Substitution Box to Threshold., , , and . INDOCRYPT (1), volume 14459 of Lecture Notes in Computer Science, page 48-67. Springer, (2023)Parameter sensing and object tracking using global positioning system., , , , and . ISED, page 289-293. IEEE, (2016)Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation., , , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 105-A (3): 311-325 (2022)BAKSHEESH: Similar Yet Different From GIFT., , , , , , , , , and 7 other author(s). IACR Cryptol. ePrint Arch., (2023)