From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Indian thermal power plant challenges and remedies via application of modified data envelopment analysis., , , и . Int. Trans. Oper. Res., 21 (6): 955-977 (2014)EM-X-DL: Efficient Cross-Device Deep Learning Side-Channel Attack with Noisy EM Signatures., , , , , и . CoRR, (2020)Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications., , , , , , и . J. Hardw. Syst. Secur., 3 (2): 103-131 (2019)Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator., , , , , , , и . CoRR, (2018)A GF(p) elliptic curve group operator resistant against side channel attacks., , , и . ACM Great Lakes Symposium on VLSI, стр. 53-58. ACM, (2008)High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields., , и . CHES, том 6917 из Lecture Notes in Computer Science, стр. 442-458. Springer, (2011)Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher., , , и . IACR Cryptology ePrint Archive, (2020)Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks., , , и . VDAT, том 7373 из Lecture Notes in Computer Science, стр. 370-372. Springer, (2012)Towards Efficient and Automated Side Channel Evaluations at Design Time., , , , и . PROOFS, том 7 из Kalpa Publications in Computing, стр. 16-31. EasyChair, (2018)Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields.. ISVLSI, стр. 363-364. IEEE Computer Society, (2011)