Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel lightweight FF-APUF design for FPGA., , , and . SoCC, page 75-80. IEEE, (2016)A Theoretical Model to Link Uniqueness and Min-Entropy for PUF Evaluations., , , , and . IEEE Trans. Computers, 68 (2): 287-293 (2019)Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace., , and . CT-RSA, volume 9048 of Lecture Notes in Computer Science, page 431-448. Springer, (2015)Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis? Breaking multiple layers of side-channel countermeasures., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (4): 49-85 (2020)Unknown Plaintext Template Attacks., , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 148-162. Springer, (2009)A Hardware Wrapper for the SHA-3 Hash Algorithms., , , , , , and . IACR Cryptology ePrint Archive, (2010)FPGA-based strong PUF with increased uniqueness and entropy properties., , and . ISCAS, page 1-4. IEEE, (2017)Neural network based attack on a masked implementation of AES., , and . HOST, page 106-111. IEEE Computer Society, (2015)Pre-processing power traces to defeat random clocking countermeasures., , and . ISCAS, page 85-88. IEEE, (2015)A Flip-Flop Based Arbiter Physical Unclonable Function (APUF) Design with High Entropy and Uniqueness for FPGA Implementation., , , , , and . IEEE Trans. Emerg. Top. Comput., 9 (4): 1853-1866 (2021)