Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial Context Tree Weighting for Physical Unclonable Functions., , , and . ECCTD, page 1-4. IEEE, (2020)B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection., , , , and . HOST, page 49-56. IEEE Computer Society, (2018)Breaking Hitag 2 Revisited.. SPACE, volume 7644 of Lecture Notes in Computer Science, page 126-143. Springer, (2012)Side-Channel Analysis of the TERO PUF., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 43-60. Springer, (2019)Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs - Extended Version., , , , and . J. Hardw. Syst. Secur., 3 (1): 78-93 (2019)Higher-Order Alphabet Physical Unclonable Functions: Constructions, Properties, and Applications.. Technical University of Munich, Germany, (2019)Analysis of Arbitrary Waveform Generation for Voltage Glitches., and . FDTC, page 36-47. IEEE, (2023)High-Performance Design Patterns and File Formats for Side-Channel Analysis., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (2): 769-794 (2024)Your rails cannot hide from localized EM: how dual-rail logic fails on FPGAs - extended version., , and . J. Cryptographic Engineering, 8 (2): 125-139 (2018)The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond., and . J. Hardw. Syst. Secur., 2 (4): 289-296 (2018)