From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms., , , , , , , , и . CRiSIS, том 8924 из Lecture Notes in Computer Science, стр. 116-130. Springer, (2014)Profiled Side-Channel Analysis in the Efficient Attacker Framework., , , и . CARDIS, том 13173 из Lecture Notes in Computer Science, стр. 44-63. Springer, (2021)Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience., , и . ACNS, том 10355 из Lecture Notes in Computer Science, стр. 393-414. Springer, (2017)Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , и . IACR Cryptology ePrint Archive, (2017)On What to Learn: Train or Adapt a Deeply Learned Profile?, , и . IACR Cryptol. ePrint Arch., (2020)Trace-to-Trace Translation for SCA., , и . CARDIS, том 13173 из Lecture Notes in Computer Science, стр. 24-43. Springer, (2021)ULTRA: Ultimate Rootkit Detection over the Air., , и . RAID, стр. 232-251. ACM, (2022)Physical Security Versus Masking Schemes., , , , и . Cyber-Physical Systems Security, Springer, (2018)Detecting Hidden Leakages., , и . ACNS, том 8479 из Lecture Notes in Computer Science, стр. 324-342. Springer, (2014)On the Performance of Convolutional Neural Networks for Side-Channel Analysis., , , , , и . SPACE, том 11348 из Lecture Notes in Computer Science, стр. 157-176. Springer, (2018)