Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Integrated Circuits Characterization Through Computer Vision Assistance., , , , , and . ETFA, page 1247-1250. IEEE, (2020)Voltage Spikes on the Substrate to Obtain Timing Faults., , , , and . DSD, page 483-486. IEEE Computer Society, (2013)From theory to practice: horizontal attacks on protected implementations of modular exponentiations., , , , and . J. Cryptographic Engineering, 9 (1): 37-52 (2019)Random Euclidean Addition Chain Generation and Its Application to Point Multiplication., , , , and . INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 238-261. Springer, (2010)Spatial Location in Integrated Circuits through Infrared Microscopy., , , , , , and . Sensors, 21 (6): 2175 (2021)Shape analysis for power signal cryptanalysis on secure components., , , , and . J. Syst. Softw., 84 (5): 753-762 (2011)On Statistical Testing of Random Numbers Generators., , , and . SCN, volume 4116 of Lecture Notes in Computer Science, page 271-287. Springer, (2006)Collision Based Attacks in Practice., , , and . DSD, page 367-374. IEEE Computer Society, (2015)Autofocus in infrared microscopy., , , , , and . ETFA, page 631-637. IEEE, (2018)Collision for Estimating SCA Measurement Quality and Related Applications., , , , , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 143-157. Springer, (2015)