Author of the publication

In-depth energy analysis of security algorithms and protocols for the Internet of Things.

, , , and . J. Cryptogr. Eng., 12 (2): 137-149 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 267-292 (2018)Intelligent Security: Is ÄI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412)., , and . Dagstuhl Reports, 12 (10): 106-128 (October 2022)SHeLA: Scalable Heterogeneous Layered Attestation., , , , and . IEEE Internet Things J., 6 (6): 10240-10250 (2019)In-depth energy analysis of security algorithms and protocols for the Internet of Things., , , and . J. Cryptogr. Eng., 12 (2): 137-149 (2022)PROOFS 2018 Editorial., and . J. Cryptogr. Eng., 10 (4): 287 (2020)Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware., , , , and . Microprocess. Microsystems, (2020)Lightweight Ciphers and Their Side-Channel Resilience., , , and . IEEE Trans. Computers, 69 (10): 1434-1448 (2020)Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology., , , , , , , , and . CF, page 258-262. ACM, (2022)An FPGA implementation of an elliptic curve processor GF(2m)., , and . ACM Great Lakes Symposium on VLSI, page 454-457. ACM, (2004)Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration., , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 346-362. Springer, (2008)