Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From theory to practice: horizontal attacks on protected implementations of modular exponentiations., , , , and . J. Cryptographic Engineering, 9 (1): 37-52 (2019)Finding EM leakages at design stage: a simulation methodology., , , , and . IACR Cryptol. ePrint Arch., (2020)Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage., , and . IACR Cryptol. ePrint Arch., (2023)Checking Robustness Against EM Side-Channel Attacks Prior to Manufacturing., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (5): 1264-1275 (2022)Near-Field Mapping System to Scan in Time Domain the Magnetic Emissions of Integrated Circuits., , , , and . PATMOS, volume 5349 of Lecture Notes in Computer Science, page 229-236. Springer, (2008)Voltage Spikes on the Substrate to Obtain Timing Faults., , , , and . DSD, page 483-486. IEEE Computer Society, (2013)Enhancing Electromagnetic Analysis Using Magnitude Squared Incoherence., , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 20 (3): 573-577 (2012)Triple Rail Logic Robustness against DPA., , , , , , and . ReConFig, page 415-420. IEEE Computer Society, (2008)Protecting Secure ICs Against Side-Channel Attacks by Identifying and Quantifying Potential EM and Leakage Hotspots at Simulation Stage., , , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 129-147. Springer, (2021)Modeling Time Domain Magnetic Emissions of ICs., , , , , and . PATMOS, volume 6448 of Lecture Notes in Computer Science, page 238-249. Springer, (2010)