From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version., , и . J. Cryptographic Engineering, 5 (2): 95-112 (2015)Analysis of Bernstein's Factorization Circuit., , , и . ASIACRYPT, том 2501 из Lecture Notes in Computer Science, стр. 1-26. Springer, (2002)DroidDisintegrator: Intra-Application Information Flow Control in Android Apps., и . AsiaCCS, стр. 401-412. ACM, (2016)Plumo: An Ultralight Blockchain Client., , , , , , , , и . Financial Cryptography, том 13411 из Lecture Notes in Computer Science, стр. 597-614. Springer, (2022)Noninterference for a Practical DIFC-Based Operating System., и . SP, стр. 61-76. IEEE Computer Society, (2009)Analyzing Unique-Bid Auction Sites for Fun and Profit., , и . NDSS, The Internet Society, (2013)Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity., , и . CSLAW, стр. 37-49. ACM, (2022)ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge., , , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)Factoring large numbers with the TWIRL device, и . Crypto 2003, LNCS 2729, стр. 1--26. (2003)Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels., , , и . IEEE Symposium on Security and Privacy, стр. 853-869. IEEE, (2019)