From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Differential Fault Analysis on the AES Key Schedule., и . IACR Cryptology ePrint Archive, (2007)Scalar Multiplication on Koblitz Curves using tau2-NAF., , , , и . IACR Cryptology ePrint Archive, (2011)Differential Fault Analysis on Stream Cipher MUGI., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 242-251 (2012)Brand Validation: Security Indicator to Better Indicate Website Identity., , , , , и . HCI (27), том 12788 из Lecture Notes in Computer Science, стр. 432-447. Springer, (2021)Improved Differential Fault Analysis on CLEFIA., и . FDTC, стр. 25-34. IEEE Computer Society, (2008)Differential Fault Analysis on AES with 192 and 256-Bit Keys., и . IACR Cryptology ePrint Archive, (2010)Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient., , , и . ACISP, том 7959 из Lecture Notes in Computer Science, стр. 286-301. Springer, (2013)Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers., и . FDTC, стр. 84-92. IEEE Computer Society, (2009)Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 192-202 (2015)DFA Mechanism on the AES Key Schedule., , и . FDTC, стр. 62-74. IEEE Computer Society, (2007)