Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Buffer overflow attack with multiple fault injection and a proven countermeasure., , , , , and . J. Cryptographic Engineering, 7 (1): 35-46 (2017)Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (3): 473-503 (2023)Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs., , , , , and . IACR Cryptol. ePrint Arch., (2022)Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated Informative CAN Messages., , , , , and . J. Inf. Process., (2019)Security Threat Analysis of Automotive Infotainment Systems., , and . VTC Fall, page 1-7. IEEE, (2020)Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA., , , and . PROOFS, volume 11 of Kalpa Publications in Computing, page 64-77. EasyChair, (2019)Improved Differential Fault Analysis on CLEFIA., and . FDTC, page 25-34. IEEE Computer Society, (2008)Fault Injection and Key Retrieval Experiments on an Evaluation Board., , , , , and . Fault Analysis in Cryptography, Springer, (2012)An Overview of Cyber Security for Connected Vehicles.. IEICE Trans. Inf. Syst., 101-D (11): 2561-2575 (2018)Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 192-202 (2015)