Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special Session: Mitigating Side-Channel Attacks Through Circuit to Application Layer Approaches., , , , , , , , , and 5 other author(s). CODES+ISSS, page 8-17. IEEE, (2023)PROLEAD - A Probing-Based Hardware Leakage Detection Tool., and . IACR Cryptol. ePrint Arch., (2022)Automated Generation of Masked Hardware., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 589-629 (2022)Automated Masking of FPGA-Mapped Designs., , , , and . FPL, page 79-85. IEEE, (2023)Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits., , , and . IACR Cryptol. ePrint Arch., (2022)PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries., , and . IACR Cryptol. ePrint Arch., (2023)Automated Generation of Masked Hardware., , , and . IACR Cryptol. ePrint Arch., (2021)A Thorough Evaluation of RAMBAM., , , and . CCS, page 1705-1717. ACM, (2023)Low-Latency Hardware Masking of PRINCE., , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 148-167. Springer, (2021)Glitch-free is not Enough - Revisiting Glitch-Extended Probing Model., , and . IACR Cryptol. ePrint Arch., (2023)