Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: An Overview of Algorithmic Methods in IC Reverse Engineering., , and . ASHES@CCS, page 65-74. ACM, (2019)Revealing On-chip Proprietary Security Functions with Scan Side Channel Based Reverse Engineering., , and . ACM Great Lakes Symposium on VLSI, page 233-238. ACM, (2017)First Full-Fledged Side Channel Attack on HMAC-SHA-2., , , , , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 31-52. Springer, (2021)Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (3): 1-29 (2023)Using Scan Side Channel for Detecting IP Theft., , , and . HASP@ISCA, page 1:1-1:8. ACM, (2016)Memory-Side Protection With a Capability Enforcement Co-Processor., , , , , , , , , and . ACM Trans. Archit. Code Optim., 16 (1): 5:1-5:26 (2019)Redundancy AES Masking Basis for Attack Mitigation (RAMBAM)., , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (2): 69-91 (2022)A survey of algorithmic methods in IC reverse engineering., , , , , and . IACR Cryptol. ePrint Arch., (2021)DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (4): 309-336 (2020)Using Scan Side Channel to Detect IP Theft., , , and . IEEE Trans. Very Large Scale Integr. Syst., 25 (12): 3268-3280 (2017)