From post

Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go?

, , и . COSADE, том 10348 из Lecture Notes in Computer Science, стр. 207-222. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Record Setting Software Implementation of DES Using CUDA., , , и . ITNG, стр. 748-755. IEEE Computer Society, (2010)Fast Disk Encryption through GPGPU Acceleration., , , , и . PDCAT, стр. 102-109. IEEE Computer Society, (2009)On the Efficiency of Design Time Evaluation of the Resistance to Power Attacks., , , и . DSD, стр. 777-785. IEEE Computer Society, (2011)An Efficient Barrett Reduction Algorithm for Gaussian Integer Moduli., , и . ARITH, стр. 76-83. IEEE, (2023)Forging Dilithium and Falcon Signatures by Single Fault Injection., и . FDTC, стр. 81-88. IEEE, (2023)Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption., , , , , и . IACR Cryptol. ePrint Arch., (2023)A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes., , и . CS2@HiPEAC, стр. 7-12. ACM, (2016)Side-channel leakage aware instruction scheduling., , и . CS2@HiPEAC, стр. 7-12. ACM, (2017)Algorithmic and Protocol Level Countermeasures to Protect Cryptographic Devices.. Technical University Munich, Germany, (2018)A Differential Fault Attack Against Deterministic Falcon Signatures., и . CARDIS, том 14530 из Lecture Notes in Computer Science, стр. 43-61. Springer, (2023)