Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A universal hardware API for authenticated ciphers., , , , , and . ReConFig, page 1-8. IEEE, (2015)High-Speed RTL Implementations and FPGA Benchmarking of Three Authenticated Ciphers Competing in CAESAR Round Two., and . FCCM, page 93. IEEE Computer Society, (2016)Fault Intensity Map Analysis with Neural Network Key Distinguisher., , and . ASHES@CCS, page 33-42. ACM, (2019)FIMA: Fault Intensity Map Analysis., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 63-79. Springer, (2019)Minerva: Automated hardware optimization tool., , , and . ReConFig, page 1-8. IEEE, (2017)A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher., , and . HOST, page 41-50. IEEE, (2019)An Open-Source Platform for Evaluation of Hardware Implementations of Lightweight Authenticated Ciphers., , and . ReConFig, page 1-5. IEEE, (2019)Comparison of cost of protection against differential power analysis of selected authenticated ciphers., , , , and . HOST, page 147-152. IEEE Computer Society, (2018)COMA: Communication and Obfuscation Management Architecture., , , , , , , and . RAID, page 181-195. USENIX Association, (2019)Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling., , and . IACR Cryptology ePrint Archive, (2019)