Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack., , and . IACR Cryptology ePrint Archive, (2011)BLAKE-512-Based 128-Bit CCA2 Secure Timing Attack Resistant McEliece Cryptoprocessor., and . IEEE Trans. Computers, 63 (5): 1124-1133 (2014)Constraints for effective distribution network expansion planning: an ample review., , , and . Int. J. Syst. Assur. Eng. Manag., 11 (3): 531-546 (2020)A first look at performance of TV streaming sticks., , , and . Sarnoff Symposium, page 1-6. IEEE, (2017)Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack., , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (12): 2720-2733 (2019)A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device., , , and . IACR Cryptology ePrint Archive, (2020)Intelligent IoT Motes: Preventing Their Abuse at the Weakest Entry Point., , and . IEEE Des. Test, 36 (2): 73-80 (2019)First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off., , , and . Int. J. Netw. Secur., 15 (3): 219-230 (2013)SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing., , , , and . IEEE Access, (2020)A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange., , , , , , and . IACR Cryptol. ePrint Arch., (2021)