From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA., , и . CHES, том 3659 из Lecture Notes in Computer Science, стр. 250-264. Springer, (2005)Efficient Techniques for High-Speed Elliptic Curve Cryptography., и . CHES, том 6225 из Lecture Notes in Computer Science, стр. 80-94. Springer, (2010)Methodology for EM Fault Injection: Charge-based Fault Model., и . DATE, стр. 256-259. IEEE, (2019)Simultaneous Scheduling and Allocation for Cost Constrained Optimal Architectural Synthesis., и . DAC, стр. 2-7. ACM, (1991)Counteracting power analysis attack using Static Single-ended Logic., , и . ISCAS, стр. 721-724. IEEE, (2011)EM Fault Injection on ARM and RISC-V., , и . ISQED, стр. 206-212. IEEE, (2020)A Propagation Rate Based Splitting Heuristic for Divide-and-Conquer Solvers., , , , , , и . SAT, том 10491 из Lecture Notes in Computer Science, стр. 251-260. Springer, (2017)Optimal Scheduling and Allocation of Embedded VLSI Chips.. DAC, стр. 116-119. IEEE Computer Society Press, (1992)Security wrappers and power analysis for SoC technologies., и . CODES+ISSS, стр. 162-167. ACM, (2003)Secure and safety-critical vs. insecure, non safety-critical embedded systems: do they require completely different design approaches?, и . CODES+ISSS, стр. 72. ACM, (2004)