From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Provable Secure Software Masking in the Real-World., , , , и . COSADE, том 13211 из Lecture Notes in Computer Science, стр. 215-235. Springer, (2022)Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices., , и . ICISC, том 5461 из Lecture Notes in Computer Science, стр. 253-267. Springer, (2008)Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers., , и . CARDIS, том 10728 из Lecture Notes in Computer Science, стр. 196-212. Springer, (2017)Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology., , , , , , , , и . CF, стр. 258-262. ACM, (2022)Empirical comparison of side channel analysis distinguishers on DES in hardware., , , и . ECCTD, стр. 391-394. IEEE, (2009)Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration., , и . CHES, том 5154 из Lecture Notes in Computer Science, стр. 346-362. Springer, (2008)An In-Depth Security Evaluation of the Nintendo DSi Gaming Console., , , и . CARDIS, том 14530 из Lecture Notes in Computer Science, стр. 23-42. Springer, (2023)Consolidating Inner Product Masking., , , , и . ASIACRYPT (1), том 10624 из Lecture Notes in Computer Science, стр. 724-754. Springer, (2017)Revisiting Higher-Order DPA Attacks: ., , , и . CT-RSA, том 5985 из Lecture Notes in Computer Science, стр. 221-234. Springer, (2010)Theory and Practice of a Leakage Resilient Masking Scheme., , , и . ASIACRYPT, том 7658 из Lecture Notes in Computer Science, стр. 758-775. Springer, (2012)