From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Side-channel power analysis of different protection schemes against fault attacks on AES., , , и . ReConFig, стр. 1-6. IEEE, (2014)A Statistical Model for DPA with Novel Algorithmic Confusion Analysis., , и . CHES, том 7428 из Lecture Notes in Computer Science, стр. 233-250. Springer, (2012)Efficient 2nd-order power analysis on masked devices utilizing multiple leakage., , , и . HOST, стр. 118-123. IEEE Computer Society, (2015)A statistics-based success rate model for DPA and CPA., , , и . J. Cryptogr. Eng., 5 (4): 227-243 (2015)A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks., , , и . ASIACRYPT (2), том 9453 из Lecture Notes in Computer Science, стр. 338-360. Springer, (2015)Side-channel power analysis of XTS-AES., , и . DATE, стр. 1330-1335. IEEE, (2017)Compiler-Assisted Threshold Implementation against Power Analysis Attacks., , , , , , и . ICCD, стр. 541-544. IEEE Computer Society, (2017)Towards secure cryptographic software implementation against side-channel power analysis attacks., , , и . ASAP, стр. 144-148. IEEE Computer Society, (2015)A Robust-Equitable Measure for Feature Ranking and Selection., , , и . J. Mach. Learn. Res., (2017)A Statistical Model for Higher Order DPA on Masked Devices., , , и . CHES, том 8731 из Lecture Notes in Computer Science, стр. 147-169. Springer, (2014)