Author of the publication

Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology.

, , , , , , , , and . CF, page 258-262. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provable Secure Software Masking in the Real-World., , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 215-235. Springer, (2022)Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (3): 147-168 (2020)Dismantling DST80-based Immobiliser Systems., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (2): 99-127 (2020)An In-Depth Security Evaluation of the Nintendo DSi Gaming Console., , , and . CARDIS, volume 14530 of Lecture Notes in Computer Science, page 23-42. Springer, (2023)Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 345-366 (2022)My other car is your car: compromising the Tesla Model X keyless entry system., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 149-172 (2021)On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks., , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 143-163. Springer, (2022)SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution., , , , and . USENIX Security Symposium, page 6293-6310. USENIX Association, (2023)Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (3): 66-85 (2019)Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication., , , , , and . IACR Cryptol. ePrint Arch., (2022)