From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluation of Simple/Comparative Power Analysis against an RSA ASIC Implementation., , , и . ISCAS, стр. 2918-2921. IEEE, (2009)Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation., , и . COSADE, том 10348 из Lecture Notes in Computer Science, стр. 50-64. Springer, (2017)Electromagnetic Analysis against Public-Key Cryptographic Software on Embedded OS., , , , и . IEICE Trans. Commun., 98-B (7): 1242-1249 (2015)Introduction to the PROOFS 2016 special section.. J. Cryptogr. Eng., 7 (4): 297-298 (2017)Efficient Modular Polynomial Multiplier for NTT Accelerator of Crystals-Kyber., , и . DSD, стр. 528-533. IEEE, (2022)Distributed evolutionary design of constant-coefficient multipliers., , , и . ICECS, стр. 249-252. IEEE, (2001)Effective data processing and protection techniques for community network nodes., и . WPMC, стр. 574-575. IEEE, (2012)EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor., , , , , , и . CHES, том 8731 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2014)Differential power analysis of AES ASIC implementations with various S-box circuits., , , и . ECCTD, стр. 395-398. IEEE, (2009)An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks., , , , , и . FDTC, стр. 95-102. IEEE Computer Society, (2012)