From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bitstream Modification of Trivium., , и . IACR Cryptol. ePrint Arch., (2020)A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation., , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 676-707 (2021)Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste., , и . IACR Cryptol. ePrint Arch., (2022)Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis., , и . ASHES@CCS, стр. 51-61. ACM, (2021)Attacking Trivium at the Bitstream Level., , и . ICCD, стр. 640-647. IEEE, (2020)Mitigating single-event upsets in COTS SDRAM using an EDAC SDRAM controller., , и . NORCAS, стр. 1-6. IEEE, (2017)Implementation of a fault-tolerant, globally-asynchronous-locally-synchronous, inter-chip NoC communication bridge on FPGAs., , и . NORCAS, стр. 1-6. IEEE, (2017)Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste., , , и . APKC@AsiaCCS, стр. 10-20. ACM, (2023)A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber., , , и . IACR Cryptol. ePrint Arch., (2023)Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber., , , и . ACNS Workshops, том 13907 из Lecture Notes in Computer Science, стр. 159-177. Springer, (2023)