Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Trojan for Lightweight Cryptoraphy Elephant., , , and . GCCE, page 944-945. IEEE, (2021)Deep Learning Based Side-Channel Analysis for Lightweight Cipher PRESENT., , , and . ICCAE, page 570-574. IEEE, (2023)Hamming Weight aware Fault Analysis for Lightweight Cryptography TWINE., , and . CCIOT, page 59-63. ACM, (2023)Machine Learning Based Power Analysis for Simon with Secure Mechanism., , , and . ICCAE, page 26-29. IEEE, (2023)Explainable AI based Adversarial Examples and its Evaluation., , , and . ICECC, page 220-225. ACM, (2023)AI Hardware Oriented Trojan Detection Architecture., , , and . ICECC, page 9-15. ACM, (2022)Tamper Resistance Evaluation of Midori128 against Differential Power Analysis., , and . ICKII, page 157-160. IEEE, (2023)Performance Evaluation of CAESAR Authenticated Encryption on SROS2., , , , , and . AICCC, page 168-172. ACM, (2019)Statistical Power Analysis for IoT Device Oriented Encryption with Glitch Canceller., , and . IWCIA, page 73-76. IEEE, (2019)Evaluation of the Hiding-Countermeasure PRINCE Using Differential Power Analysis., , and . GCCE, page 164-165. IEEE, (2019)