Author of the publication

Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.

, , , , , , and . FDTC, page 29-39. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Advanced GNU Radio Receiver of IEEE 802.15.4 OQPSK Physical Layer., , , , , and . IEEE Internet Things J., 8 (11): 9206-9218 (2021)A DSP implementation of OFDM acoustic modem., , , and . Underwater Networks, page 89-92. ACM, (2007)Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors., , , and . ICCD, page 187-193. IEEE, (2007)An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms., and . ITNG, page 120-126. IEEE Computer Society, (2008)Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-Set Processors., , , and . IEEE Trans. Very Large Scale Integr. Syst., 18 (11): 1519-1532 (2010)A vulnerability study of geographic routing in Underwater Acoustic Networks., , , and . CNS, page 109-117. IEEE, (2013)Alternative application-specific processor architectures for fast arbitrary bit permutations., , and . Int. J. Embed. Syst., 3 (4): 219-228 (2008)SoK: Sharding on Blockchain., , , and . AFT, page 41-61. ACM, (2019)Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering., , , , , , and . FDTC, page 29-39. IEEE Computer Society, (2014)Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool., and . ITNG, page 359-365. IEEE Computer Society, (2011)