From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses., , , и . IACR Cryptol. ePrint Arch., (2023)Don’t Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking., , , и . IACR Cryptol. ePrint Arch., (2022)Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking., , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (1): 32-59 (2023)Towards Fine-grained Side-Channel Instruction Disassembly on a System-on-Chip., , , и . DSD, стр. 472-479. IEEE, (2022)Template Attacks against ECC: practical implementation against Curve25519., , и . HOST, стр. 13-22. IEEE, (2020)Fit the Joint Moments: How to Attack Any Masking Scheme., , , и . IEEE Access, (2022)Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection., , и . ReConFig, стр. 1-6. IEEE, (2015)A Bit-Level Approach to Side Channel Based Disassembling., , и . CARDIS, том 11833 из Lecture Notes in Computer Science, стр. 143-158. Springer, (2019)Side-channel disassembly on a System-on-Chip: A practical feasibility study., , , и . Microprocess. Microsystems, (2023)Leakage Assessment Through Neural Estimation of the Mutual Information., , и . ACNS Workshops, том 12418 из Lecture Notes in Computer Science, стр. 144-162. Springer, (2020)