From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks., , и . IACR Cryptology ePrint Archive, (2014)ShieldFS: a self-healing, ransomware-aware filesystem., , , , , , и . ACSAC, стр. 336-347. ACM, (2016)Securing software cryptographic primitives for embedded systems against side channel attacks., , и . ICCST, стр. 1-6. IEEE, (2014)Automated instantiation of side-channel attacks countermeasures for software cipher implementations., , и . Conf. Computing Frontiers, стр. 455-460. ACM, (2016)Systematic parsing of X.509: Eradicating security issues with a parse tree., , и . Journal of Computer Security, 26 (6): 817-849 (2018)A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications., , , , и . IACR Cryptology ePrint Archive, (2019)Locating Side Channel Leakage in Time through Matched Filters., , и . Cryptogr., 6 (2): 26 (2022)OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives., , , и . Concurr. Comput. Pract. Exp., 27 (14): 3633-3660 (2015)Exploring Cortex-M Microarchitectural Side Channel Information Leakage., , , и . IEEE Access, (2021)On the Computational Hardness of the Code Equivalence Problem in Cryptography., , , и . IACR Cryptol. ePrint Arch., (2022)