Author of the publication

Workshop on Fault Diagnosis and Tolerance in Cryptography.

, and . DSN, page 902. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Countermeasures against fault attacks on software implemented AES: effectiveness and cost., , , , and . WESS, page 7. ACM, (2010)Connectivity and performance tradeoffs in the cascade correlation learning architecture., and . IEEE Trans. Neural Networks, 5 (6): 930-935 (1994)Countermeasures against Branch Target Buffer Attacks., , , and . FDTC, page 75-79. IEEE Computer Society, (2007)Event-driven adaptive duty-cycling in sensor networks., , , and . Int. J. Sens. Networks, 6 (2): 89-100 (2009)Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation., , , , , and . RFIDSec, volume 7055 of Lecture Notes in Computer Science, page 48-60. Springer, (2011)Effective analytical delay model for transistor sizing., and . ASP-DAC, page 387-392. ACM Press, (2005)The Effect of Wire Length Minimization on Yield., , and . DFT, page 97-105. IEEE Computer Society, (1994)Using Simulated Annealing for Mapping Algorithms onto Data Driven Arrays., and . ICPP (1), page 123-127. CRC Press, (1991)Discrete and Continuous Models for the Performance of Reconfigurable Multistage Systems., and . IEEE Trans. Computers, 40 (9): 1024-1033 (1991)A Unified Negative-Binomial Distribution for Yield Analysis of Defect-Tolerant Circuits., , and . IEEE Trans. Computers, 42 (6): 724-734 (1993)