Author of the publication

Impeccable Keccak Towards Fault Resilient SPHINCS+ Implementations.

, , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (2): 154-189 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inferring characteristic phenotypes via class association rule mining in the bone dysplasia domain., , , and . J. Biomed. Informatics, (2014)Breaking TrustZone Memory Isolation through Malicious Hardware on a Modern FPGA-SoC., , , and . ASHES@CCS, page 3-12. ACM, (2019)Earthquake - A NoC-based optimized differential cache-collision attack for MPSoCs., , , and . DATE, page 648-653. IEEE, (2018)Capturing domain knowledge from multiple sources: the rare bone disorders use case., , , and . J. Biomed. Semant., (2015)The Human Phenotype Ontology in 2017., , , , , , , , , and 49 other author(s). Nucleic Acids Res., 45 (Database-Issue): D865-D876 (2017)PerfWeb: How to Violate Web Privacy with Hardware Performance Events., , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 80-97. Springer, (2017)Beyond Cache Attacks: Exploiting the Bus-based Communication Structure for Powerful On-Chip Microarchitectural Attacks., , , and . ACM Trans. Embed. Comput. Syst., 20 (2): 17:1-17:23 (2021)Supervised segmentation of phenotype descriptions for the human skeletal phenome using hybrid methods., , and . BMC Bioinform., (2012)Undermining User Privacy on Mobile Devices Using AI., , , , , and . CoRR, (2018)Experiences with Modeling Composite Phenotypes in the SKELETOME Project., , and . ISWC (2), volume 7650 of Lecture Notes in Computer Science, page 82-97. Springer, (2012)