Author of the publication

Teaching Software Testing Using Automated Grading

, , , , and . Proceedings of the Fifth Workshop Äutomatische Bewertung von Programmieraufgaben" (ABP 2021),virtual event, October 28-29, 2021, Gesellschaft für Informatik, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium., , , , and . IACR Cryptol. ePrint Arch., (2023)Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (2): 256-292 (2019)Cyber Resilience for Self-Monitoring IoT Devices., , , , and . CSR, page 160-167. IEEE, (2021)ExplAIn Yourself! Transparency for Positive UX in Autonomous Driving., , , , , and . CHI, page 161:1-161:12. ACM, (2021)SPARX - A side-channel protected processor for ARX-based cryptography., , , and . DATE, page 990-995. IEEE, (2017)Impeccable Circuits., , , , and . IACR Cryptology ePrint Archive, (2018)10 Gbit/s bidirectional optical wireless communication module for docking devices., , and . GLOBECOM Workshops, page 512-517. IEEE, (2014)Multi-Tuple Leakage Detection and the Dependent Signal Issue., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (2): 318-345 (2019)Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order., , and . COSADE, volume 9689 of Lecture Notes in Computer Science, page 199-217. Springer, (2016)Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations., and . CHES, volume 9293 of Lecture Notes in Computer Science, page 495-513. Springer, (2015)