From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formal Verification of Arithmetic Masking in Hardware and Software., , и . ACNS (1), том 13905 из Lecture Notes in Computer Science, стр. 3-32. Springer, (2023)Compress: Generate Small and Fast Masked Pipelined Circuits., , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (3): 500-529 (2024)Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs., , , , и . IACR Cryptol. ePrint Arch., (2020)Power Contracts: Provably Complete Power Leakage Models for Processors., , , , , и . CCS, стр. 381-395. ACM, (2022)Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs., , , , и . USENIX Security Symposium, стр. 1469-1468. USENIX Association, (2021)Secure Context Switching of Masked Software Implementations., , и . AsiaCCS, стр. 980-992. ACM, (2023)Secure and Efficient Software Masking on Superscalar Pipelined Processors., , и . ASIACRYPT (2), том 13091 из Lecture Notes in Computer Science, стр. 3-32. Springer, (2021)Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency., , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (1): 309-335 (2024)Security Aspects of Masking on FPGAs., , и . HOST, стр. 199-210. IEEE, (2024)