Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography., , , , , and . ARES, page 144:1-144:9. ACM, (2022)Evaluation of Software-Oriented Block Ciphers on Smartphones., , , , , and . FPS, volume 8352 of Lecture Notes in Computer Science, page 353-368. Springer, (2013)Modeling the Trade-off Between Security and Performance to Support the Product Life Cycle., , , , , , , , , and . MECO, page 1-6. IEEE, (2019)Assessment of Cryptography Support and Security on Programmable Smart Cards., , , and . TSP, page 1-5. IEEE, (2018)Power analysis attack based on the MLP in DPA Contest v4., , , and . TSP, page 154-158. IEEE, (2015)Methodology for correlations discovery in security logs., , , and . ICUMT, page 294-298. IEEE, (2017)Hardware-Accelerated Twofish Core for FPGA., , and . TSP, page 1-5. IEEE, (2018)Capturing the Vehicle to Everything Communication Using Software Defined Radio in ITS-G5., , , , and . TSP, page 238-241. IEEE, (2022)Scalable DDoS Mitigation System., , and . TSP, page 617-620. IEEE, (2019)Detection of wireless fake access points., , , and . ICUMT, page 113-118. IEEE, (2020)