From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design., , , , , , , и . DFT, стр. 1-6. IEEE, (2021)Towards a Better Understanding of Side-Channel Analysis Measurements Setups., , и . CARDIS, том 13173 из Lecture Notes in Computer Science, стр. 64-79. Springer, (2021)Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications., , , и . AFRICACRYPT, том 10239 из Lecture Notes in Computer Science, стр. 79-94. (2017)Secure Implementation of TEL-compatible Flip-Flops using a Standard-Cell Approach., , и . ISCAS, стр. 1-5. IEEE, (2018)A Novel Very Low Voltage Topology to implement MCML XOR Gates., , , и . PRIME, стр. 157-160. IEEE, (2018)Novel measurements setup for attacks exploiting static power using DC pico-ammeter., , , , и . ECCTD, стр. 1-4. IEEE, (2017)Univariate Power Analysis Attacks Exploiting Static Dissipation of Nanometer CMOS VLSI Circuits for Cryptographic Applications., , , , и . IEEE Trans. Emerg. Top. Comput., 5 (3): 329-339 (2017)VHDL implementation of FWL RLS algorithm., , и . ECCTD, стр. 1-4. IEEE, (2017)A Systematic Appraisal of Side Channel Evaluation Strategies., , , , , , , , , и 1 other автор(ы). SSR, том 12529 из Lecture Notes in Computer Science, стр. 46-66. Springer, (2020)Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle., , , , , , , , и . CRYPTO (1), том 12170 из Lecture Notes in Computer Science, стр. 369-400. Springer, (2020)