Author of the publication

Comparing the cost of protecting selected lightweight block ciphers against differential power analysis in low-cost FPGAs.

, , , and . FPT, page 128-135. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A universal hardware API for authenticated ciphers., , , , , and . ReConFig, page 1-8. IEEE, (2015)Fault Intensity Map Analysis with Neural Network Key Distinguisher., , and . ASHES@CCS, page 33-42. ACM, (2019)High-Speed RTL Implementations and FPGA Benchmarking of Three Authenticated Ciphers Competing in CAESAR Round Two., and . FCCM, page 93. IEEE Computer Society, (2016)Minerva: Automated hardware optimization tool., , , and . ReConFig, page 1-8. IEEE, (2017)FIMA: Fault Intensity Map Analysis., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 63-79. Springer, (2019)A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher., , and . HOST, page 41-50. IEEE, (2019)An Open-Source Platform for Evaluation of Hardware Implementations of Lightweight Authenticated Ciphers., , and . ReConFig, page 1-5. IEEE, (2019)Comparison of cost of protection against differential power analysis of selected authenticated ciphers., , , , and . HOST, page 147-152. IEEE Computer Society, (2018)Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling., , and . IACR Cryptology ePrint Archive, (2019)Side-channel resistant soft core processor for lightweight block ciphers., , , and . ReConFig, page 1-8. IEEE, (2017)