From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Power-security trade-off in multi-level power analysis countermeasures for FSR-based stream ciphers., и . ISCAS, стр. 81-84. IEEE, (2012)Keyed logic BIST for Trojan detection in SoC., , , и . ISSoC, стр. 1-4. IEEE, (2014)An Equivalence-Preserving Transformation of Shift Registers.. SETA, том 8865 из Lecture Notes in Computer Science, стр. 187-199. Springer, (2014)A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber., , , , и . IACR Cryptol. ePrint Arch., (2022)Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber., , , и . IACR Cryptol. ePrint Arch., (2022)An Improved Hardware Implementation of the Quark Hash Function., и . RFIDSec, том 8262 из Lecture Notes in Computer Science, стр. 113-127. Springer, (2013)Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks., и . ICISC, том 8565 из Lecture Notes in Computer Science, стр. 241-255. Springer, (2013)Far Field EM Side-Channel Attack on AES Using Deep Learning., , и . ASHES@CCS, стр. 35-44. ACM, (2020)Bio-inspired fault-tolerance.. BIONETICS, стр. 2. ICST / ACM, (2008)Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES., , и . FPS, том 13877 из Lecture Notes in Computer Science, стр. 38-53. Springer, (2022)