From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proposition for Correlation Power Analysis Enhancement., , , , , и . CHES, том 4249 из Lecture Notes in Computer Science, стр. 174-186. Springer, (2006)Implementation of Complex Strategies of Security Insecure Embedded Systems., , , , , , и . NTMS, стр. 1-5. IEEE, (2011)Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter., , , и . HOST, стр. 130-135. IEEE Computer Society, (2014)Fault Injection to Reverse Engineer DES-Like Cryptosystems., , , и . FPS, том 8352 из Lecture Notes in Computer Science, стр. 105-121. Springer, (2013)Practical measurements of data path delays for IP authentication & integrity verification., , , , и . ReCoSoC, стр. 1-6. IEEE, (2013)Differential Behavioral Analysis., и . CHES, том 4727 из Lecture Notes in Computer Science, стр. 413-426. Springer, (2007)Experimental validation of a Bulk Built-In Current Sensor for detecting laser-induced currents., , , , , и . IOLTS, стр. 150-155. IEEE, (2015)Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator., , , , , , и . COSADE, том 7275 из Lecture Notes in Computer Science, стр. 151-166. Springer, (2012)COGITO: Code Polymorphism to Secure Devices., , , , , , и . SECRYPT, стр. 451-456. SciTePress, (2014)All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems., , , , , , , , и . CS2@HiPEAC, стр. 17-18. ACM, (2018)