Author of the publication

SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip.

, , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 620-640. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems., , , and . ICASSP (3), page 904-907. IEEE, (2006)Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems., , , and . Comput. Electr. Eng., 33 (5-6): 367-382 (2007)Case Study : A class E power amplifier for ISO-14443A., , , , and . DDECS, page 20-23. IEEE Computer Society, (2009)Security, Reliability and Test Aspects of the RISC-V Ecosystem., , , , , , , , , and 6 other author(s). ETS, page 1-10. IEEE, (2021)Identifying and Eliminating Side-Channel Leaks in Programmable Systems., , and . IEEE Des. Test, 35 (1): 74-89 (2018)Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA., , , and . CHES, volume 8086 of Lecture Notes in Computer Science, page 435-452. Springer, (2013)SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip., , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 620-640. Springer, (2015)Augmenting Leakage Detection Using Bootstrapping., , , , and . COSADE, volume 12244 of Lecture Notes in Computer Science, page 104-119. Springer, (2020)Protecting RISC-V against Side-Channel Attacks., , and . DAC, page 45. ACM, (2019)A Practical Attack on KeeLoq., , , , , , , , , and . J. Cryptol., 25 (1): 136-157 (2012)