From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Voltage Spikes on the Substrate to Obtain Timing Faults., , , , и . DSD, стр. 483-486. IEEE Computer Society, (2013)Efficient Integrated Circuits Characterization Through Computer Vision Assistance., , , , , и . ETFA, стр. 1247-1250. IEEE, (2020)From theory to practice: horizontal attacks on protected implementations of modular exponentiations., , , , и . J. Cryptographic Engineering, 9 (1): 37-52 (2019)Random Euclidean Addition Chain Generation and Its Application to Point Multiplication., , , , и . INDOCRYPT, том 6498 из Lecture Notes in Computer Science, стр. 238-261. Springer, (2010)Leak Resistant Arithmetic., , , и . CHES, том 3156 из Lecture Notes in Computer Science, стр. 62-75. Springer, (2004)Reverse Engineering of Embedded Software Using Syntactic Pattern Recognition., , , , и . OTM Workshops (1), том 4277 из Lecture Notes in Computer Science, стр. 527-536. Springer, (2006)Preventing SPA/DPA in ECC Systems Using the Jacobi Form., и . CHES, том 2162 из Lecture Notes in Computer Science, стр. 391-401. Springer, (2001)On Statistical Testing of Random Numbers Generators., , , и . SCN, том 4116 из Lecture Notes in Computer Science, стр. 271-287. Springer, (2006)Shape analysis for power signal cryptanalysis on secure components., , , , и . J. Syst. Softw., 84 (5): 753-762 (2011)Collision Based Attacks in Practice., , , и . DSD, стр. 367-374. IEEE Computer Society, (2015)