From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection., , , , , и . CARDIS, том 8419 из Lecture Notes in Computer Science, стр. 236-252. Springer, (2013)Foundations of Secure Scaling (Dagstuhl Seminar 16342)., , , и . Dagstuhl Reports, 6 (8): 65-90 (2016)Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes., , , , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 374-390. Springer, (2014)Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks., , , и . ACM Trans. Embed. Comput. Syst., 18 (3): 22:1-22:3 (2019)Modified Transparency Order Property: Solution or Just Another Attempt., , , и . SPACE, том 9354 из Lecture Notes in Computer Science, стр. 210-227. Springer, (2015)Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis., , и . CT-RSA, том 7178 из Lecture Notes in Computer Science, стр. 383-397. Springer, (2012)Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis., , , и . IACR Cryptol. ePrint Arch., (2020)The communication and computation cost of wireless security: extended abstract., , , и . WISEC, стр. 1-4. ACM, (2011)Wide-Weak Privacy-Preserving RFID Authentication Protocols., , , и . MOBILIGHT, том 45 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 254-267. Springer, (2010)Online Template Attacks., , , , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 21-36. Springer, (2014)