From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient fuzzy extractor for limited noise., и . Foundations for Forgery-Resilient Cryptographic Hardware, том 09282 из Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)An Elliptic Curve Processor Suitable For RFID-Tags., , , , , и . IACR Cryptology ePrint Archive, (2006)An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes., , , и . IACR Cryptology ePrint Archive, (2002)Information-theoretic analysis of coating PUFs., , , и . IACR Cryptology ePrint Archive, (2006)Efficient Binary Conversion for Paillier Encrypted Values., и . EUROCRYPT, том 4004 из Lecture Notes in Computer Science, стр. 522-537. Springer, (2006)An information theoretic model for physical uncloneable functions., , , , и . ISIT, стр. 141. IEEE, (2004)Grey-Box Cryptography: Physical Unclonable Functions.. ESAS, том 4357 из Lecture Notes in Computer Science, стр. 3-5. Springer, (2006)Anti-counterfeiting with hardware intrinsic security., и . DATE, стр. 1137-1142. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Hardware intrinsic security from D flip-flops., , , и . STC@CCS, стр. 53-62. ACM, (2010)Read-Proof Hardware from Protective Coatings., , , , , и . CHES, том 4249 из Lecture Notes in Computer Science, стр. 369-383. Springer, (2006)