Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence of passive hardware redundancy on differential power analysis resistance of AES cipher implemented in FPGA., , and . Microprocess. Microsystems, (2017)High-speed Side-channel-protected Encryption and Authentication in Hardware., , , and . IACR Cryptology ePrint Archive, (2018)General Digit-Serial Normal Basis Multiplier with Distributed Overlap., and . DSD, page 94-101. IEEE Computer Society, (2007)Evaluation of power saving methods for low-power WiFi environment sensors., and . MECO, page 1-5. IEEE, (2022)First-Order and Higher-Order Power Analysis: Computational Approaches and Aspects., , and . MECO, page 1-5. IEEE, (2019)Multiprecision ANSI C Library for Implementation of Cryptographic Algorithms on Microcontrollers., , and . MECO, page 1-4. IEEE, (2019)Omnidirectional Image Quality Assessment Database (OMNIQAD): Description and Examples., , , , , and . RADIOELEKTRONIKA, page 1-5. IEEE, (2023)Novel Dummy Rounds Schemes as a DPA Countermeasure in PRESENT Cipher., , and . DDECS, page 1-4. IEEE, (2020)Exploiting Linearity in White-Box AES with Differential Computation Analysis., and . SAI (3), volume 1230 of Advances in Intelligent Systems and Computing, page 404-419. Springer, (2020)Design and Implementation of the Memory Scheduler for the PC-Based Router., , and . FPL, volume 3203 of Lecture Notes in Computer Science, page 1133-1135. Springer, (2004)