Author of the publication

A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation.

, , , , , , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 23 (8): 1429-1438 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Verifying Physical Assumption in Card-Based Cryptography., , and . SecITC, volume 13809 of Lecture Notes in Computer Science, page 289-305. Springer, (2022)Finding the best system design flow for a high-speed JPEG encoder., , and . ASP-DAC, page 577-578. ACM, (2003)High-performance Public-key Cryptoprocessor for Wireless Mobile Applications., , , and . Mob. Networks Appl., 12 (4): 245-258 (2007)Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks., , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 181-197. Springer, (2020)A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications., , and . RFIDSec Asia, volume 11 of Cryptology and Information Security Series, page 83-94. IOS Press, (2013)Security of Block Ciphers - From Algorithm Design to Hardware Implementation., , and . Wiley, (2015)A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering., , , and . IWSEC, volume 8639 of Lecture Notes in Computer Science, page 158-173. Springer, (2014)Bit-Free Collision: Application to APOP Attack., , , and . IWSEC, volume 5824 of Lecture Notes in Computer Science, page 3-21. Springer, (2009)Three-Subset Meet-in-the-Middle Attack on Reduced XTEA., , , , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 138-154. Springer, (2012)Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl., , , , and . ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, page 38-55. Springer, (2010)