Author of the publication

Power Attacks on Secure Hardware Based on Early Propagation of Data.

, , and . IOLTS, page 131-138. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection., , and . FDTC, volume 4236 of Lecture Notes in Computer Science, page 185-195. Springer, (2006)Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard., , and . J. Syst. Archit., 53 (2-3): 139-149 (2007)DPA on Faulty Cryptographic Hardware and Countermeasures., , and . FDTC, volume 4236 of Lecture Notes in Computer Science, page 211-222. Springer, (2006)Power Attacks on Secure Hardware Based on Early Propagation of Data., , and . IOLTS, page 131-138. IEEE Computer Society, (2006)Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard., , and . CARDIS, volume 153 of IFIP, page 177-192. Kluwer/Springer, (2004)Asynchronous balanced gates tolerant to interconnect variability., , , , and . ISCAS, page 3190-3193. IEEE, (2008)Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories., , and . DSN, page 514-523. IEEE Computer Society, (2009)Robust Protection against Fault-Injection Attacks on Smart Cards Implementing the Advanced Encryption Standard., , and . DSN, page 93-101. IEEE Computer Society, (2004)Power Balanced Gates Insensitive to Routing Capacitance Mismatch., , , and . DATE, page 1280-1285. ACM, (2008)Delay Insensitive Encoding and Power Analysis: A Balancing Act., , , , , and . ASYNC, page 116-125. IEEE Computer Society, (2005)