Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protection des Accélérateurs Matériels de Cryptographie Symétrique. (Protection of Symmetric Cryptography Hardware Accelerators).. (2012)Multiply Constant Weight Codes, , , , and . Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, page 306--310. IEEE, (July 2013)CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis., , , , , and . IEEE Trans. Computers, 68 (3): 347-361 (2019)Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , and . IACR Cryptology ePrint Archive, (2017)Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level., , and . C2SI, volume 11445 of Lecture Notes in Computer Science, page 3-12. Springer, (2019)Feasibility study of a camera-based PUF in a realistic scenario., , , , , and . ARES, page 31:1-31:6. ACM, (2020)PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community., , , , , , , and . ETS, page 1-10. IEEE, (2020)Implementation flaws in the masking scheme of DPA Contest v4., and . IET Inf. Secur., 11 (6): 356-362 (2017)Impact of Aging on the Reliability of Delay PUFs., , and . J. Electron. Test., 34 (5): 571-586 (2018)A formal study of two physical countermeasures against side channel attacks., , and . J. Cryptographic Engineering, 3 (3): 169-180 (2013)