From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Evaluation of Protected Residue Number System Scalar Multiplication., , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (1): 259-282 (2019)Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes., , , , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 374-390. Springer, (2014)Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection., , , , , и . CARDIS, том 8419 из Lecture Notes in Computer Science, стр. 236-252. Springer, (2013)Foundations of Secure Scaling (Dagstuhl Seminar 16342)., , , и . Dagstuhl Reports, 6 (8): 65-90 (2016)The Energy Budget for Wireless Security: Extended Version., , , и . IACR Cryptology ePrint Archive, (2015)Modified Transparency Order Property: Solution or Just Another Attempt., , , и . SPACE, том 9354 из Lecture Notes in Computer Science, стр. 210-227. Springer, (2015)Online Template Attacks., , , , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 21-36. Springer, (2014)Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis., , и . CT-RSA, том 7178 из Lecture Notes in Computer Science, стр. 383-397. Springer, (2012)The communication and computation cost of wireless security: extended abstract., , , и . WISEC, стр. 1-4. ACM, (2011)Online template attacks., , , , и . J. Cryptographic Engineering, 9 (1): 21-36 (2019)