From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A side-channel resistant implementation of AES combining clock randomization with duplication., , , , и . ISCAS, стр. 1-5. IEEE, (2023)Side-Channel Analysis of the Random Number Generator in STM32 MCUs., и . ACM Great Lakes Symposium on VLSI, стр. 15-20. ACM, (2022)TOP: An Algorithm for Three-Level Optimization of PLDs., , , и . DATE, стр. 751. IEEE Computer Society / ACM, (2000)Bitstream Modification Attack on SNOW 3G., и . DATE, стр. 1275-1278. IEEE, (2020)Structural Testing Based on Minimum Kernels.. DATE, стр. 1168-1173. IEEE Computer Society, (2005)AIG rewriting using 5-input cuts., и . ICCD, стр. 429-430. IEEE Computer Society, (2011)CRC-PUF: A Machine Learning Attack Resistant Lightweight PUF Construction., , , , и . EuroS&P Workshops, стр. 264-271. IEEE, (2019)An Equivalence-Preserving Transformation of Shift Registers.. SETA, том 8865 из Lecture Notes in Computer Science, стр. 187-199. Springer, (2014)Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks., и . ICISC, том 8565 из Lecture Notes in Computer Science, стр. 241-255. Springer, (2013)An Improved Hardware Implementation of the Quark Hash Function., и . RFIDSec, том 8262 из Lecture Notes in Computer Science, стр. 113-127. Springer, (2013)