From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Computational Approach to Photon-Assisted Tunneling in Intense Driving Fields Based on a Fabry-Perot Analogy.. VLSI Design, 8 (1-4): 209-214 (1998)On the efficient computation of high-order derivatives for implicitly defined functions, , и . (11.12.2009)Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys., и . IACR Cryptology ePrint Archive, (2018)Gadget3 on GPUs with OpenACC., , , , , , , и . CoRR, (2020)Conjugate gradient solvers on Intel Xeon Phi and NVIDIA GPUs., , , и . CoRR, (2014)Single-Trace Template Attack on the DES Round Keys of a Recent Smart Card., и . IACR Cryptology ePrint Archive, (2017)Gadget3 on GPUs with OpenACC., , , , , , , и . PARCO, том 36 из Advances in Parallel Computing, стр. 209-218. IOS Press, (2019)700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy.. COSADE, том 7275 из Lecture Notes in Computer Science, стр. 33-38. Springer, (2012)The Need for Intrinsic Hardware Security Below 65nm.. FDTC, стр. 2. IEEE Computer Society, (2015)Synthesising Rare Cataract Surgery Samples with Guided Diffusion Models., , , , , , , , , и . MICCAI (9), том 14228 из Lecture Notes in Computer Science, стр. 354-364. Springer, (2023)