From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Atlas: Application Confidentiality in Compromised Embedded Systems., , , , , и . IEEE Trans. Dependable Secur. Comput., 16 (3): 415-423 (2019)Sweeping for Leakage in Masked Circuit Layouts., , и . DATE, стр. 915-920. IEEE, (2020)Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP., , , , и . CHES, том 3659 из Lecture Notes in Computer Science, стр. 106-118. Springer, (2005)Constructing Application-Specific Memory Hierarchies on FPGAs., , , и . Trans. High Perform. Embed. Archit. Compil., (2011)An embedded platform for privacy-friendly road charging applications., , и . DATE, стр. 867-872. IEEE Computer Society, (2010)Masking ring-LWE., , , , и . J. Cryptographic Engineering, 6 (2): 139-153 (2016)A Cost-Effective Latency-Aware Memory Bus for Symmetric Multiprocessor Systems., , , и . IEEE Trans. Computers, 57 (12): 1714-1719 (2008)The Impact of Error Dependencies on Ring/Mod-LWE/LWR Based Schemes., , и . PQCrypto, том 11505 из Lecture Notes in Computer Science, стр. 103-115. Springer, (2019)Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices., , и . ICISC, том 5461 из Lecture Notes in Computer Science, стр. 253-267. Springer, (2008)24.1 Circuit challenges from cryptography., , , и . ISSCC, стр. 1-2. IEEE, (2015)