From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance.. COSADE, том 8622 из Lecture Notes in Computer Science, стр. 56-68. Springer, (2014)Fault Attacks on a Cloud-Assisted ECDSA White-Box Based on the Residue Number System., и . FDTC, стр. 72-80. IEEE, (2023)A Unified Approach to Fair Online Learning via Blackwell Approachability., , и . NeurIPS, стр. 18280-18292. (2021)Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform., , , и . CHES, том 5154 из Lecture Notes in Computer Science, стр. 1-14. Springer, (2008)Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm., , , , и . FDTC, стр. 89-96. IEEE Computer Society, (2010)DFA on AES.. AES Conference, том 3373 из Lecture Notes in Computer Science, стр. 27-41. Springer, (2004)White-Box ECDSA: Challenges and Existing Solutions., , и . COSADE, том 12910 из Lecture Notes in Computer Science, стр. 184-201. Springer, (2021)Improved Fault Analysis of Signature Schemes., , и . CARDIS, том 6035 из Lecture Notes in Computer Science, стр. 164-181. Springer, (2010)Transient Fault Induction Attacks on XTR., и . ICICS, том 3269 из Lecture Notes in Computer Science, стр. 440-451. Springer, (2004)Enhanced Security Architecture for Music Distribution on Mobile., , , , и . ESORICS, том 4189 из Lecture Notes in Computer Science, стр. 97-109. Springer, (2006)