Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Security Vulnerabilities in Intermittent Computing., and . SPACE, volume 11348 of Lecture Notes in Computer Science, page 104-124. Springer, (2018)Design methods for security and trust., and . DATE, page 672-677. EDA Consortium, San Jose, CA, USA, (2007)Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA., , , , , , , , , and 3 other author(s). DATE, page 508-513. IEEE, (2020)Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 327-336. Springer, (2009)Optimization Method for Broadband Modem FIR Filter Design using Common Subexpression Elimination., , , and . ISSS, page 100-106. ACM / IEEE Computer Society, (1997)Differential Power Analysis of MAC-Keccak at Any Key-Length., and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 68-82. Springer, (2013)Design of Cam-E-leon, a Run-Time Reconfigurable Web Camera., , , , , , , , , and . Embedded Processor Design Challenges, volume 2268 of Lecture Notes in Computer Science, page 274-290. Springer, (2002)Offline Hardware/Software Authentication for Reconfigurable Platforms., and . CHES, volume 4249 of Lecture Notes in Computer Science, page 311-323. Springer, (2006)Guest Editors' Introduction: Security and Trust in Embedded-Systems Design., and . IEEE Des. Test Comput., 24 (6): 518-520 (2007)ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (1): 301-325 (2023)