Author of the publication

Privacy-Aware Authentication in the Internet of Things.

, , , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 32-39. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Masking the AES with Only Two Random Bits., , , and . IACR Cryptology ePrint Archive, (2018)Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags., , and . Selected Areas in Cryptography, volume 6544 of Lecture Notes in Computer Science, page 114-129. Springer, (2010)Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order., , and . TIS@CCS, page 3. ACM, (2016)Concept for a security aware automatic fare collection system using HF/UHF dual band RFID transponders., , , , , and . ESSDERC, page 194-197. IEEE, (2015)On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller., and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 149-164. Springer, (2012)Sharing is Caring - On the Protection of Arithmetic Logic Units against Passive Physical Attacks.. RFIDSec, volume 9440 of Lecture Notes in Computer Science, page 68-84. Springer, (2015)HF/UHF dual band RFID transponders for an information-driven public transportation system., , , , , , , and . Elektrotech. Informationstechnik, 133 (3): 163-175 (2016)Protecting against Statistical Ineffective Fault Attacks., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (3): 508-543 (2020)Generic Low-Latency Masking., , and . IACR Cryptol. ePrint Arch., (2017)Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures., , , , , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 315-342. Springer, (2018)