From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cross-VM Cache Attacks on AES., , , , и . IEEE Trans. Multi Scale Comput. Syst., 2 (3): 211-222 (2016)Guest Editorial: Special Section on Embedded System Security., , и . IEEE Embed. Syst. Lett., 7 (1): 1-2 (2015)Vulnerability modeling of cryptographic hardware to power analysis attacks., , , и . Integr., 42 (4): 468-478 (2009)FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning., , , и . CoRR, (2019)JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms., , , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (3): 169-195 (2020)Differential Power Analysis of the Picnic Signature Scheme., , и . PQCrypto, том 12841 из Lecture Notes in Computer Science, стр. 177-194. Springer, (2021)Cross Processor Cache Attacks., , и . AsiaCCS, стр. 353-364. ACM, (2016)Cross Processor Cache Attacks., , и . IACR Cryptology ePrint Archive, (2015)RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks., , , и . CoRR, (2019)Non-Linear Collision Analysis., , и . RFIDSec, том 8651 из Lecture Notes in Computer Science, стр. 198-214. Springer, (2014)