Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 267-292 (2018)SHeLA: Scalable Heterogeneous Layered Attestation., , , , and . IEEE Internet Things J., 6 (6): 10240-10250 (2019)Intelligent Security: Is ÄI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412)., , and . Dagstuhl Reports, 12 (10): 106-128 (October 2022)In-depth energy analysis of security algorithms and protocols for the Internet of Things., , , and . J. Cryptogr. Eng., 12 (2): 137-149 (2022)PROOFS 2018 Editorial., and . J. Cryptogr. Eng., 10 (4): 287 (2020)Lightweight Ciphers and Their Side-Channel Resilience., , , and . IEEE Trans. Computers, 69 (10): 1434-1448 (2020)Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware., , , , and . Microprocess. Microsystems, (2020)Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA., , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 133-150. Springer, (2021)Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology., , , , , , , , and . CF, page 258-262. ACM, (2022)Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration., , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 346-362. Springer, (2008)