Author of the publication

Power analysis of hardware implementations protected with secret sharing.

, , , , , and . MICRO Workshops, page 9-16. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trademark image retrieval based on scale, rotation, translation invariant features., , and . RIVF, page 282-285. IEEE, (2013)On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks., , , , and . DSD, page 214-221. IEEE, (2019)End-to-End Image Patch Quality Assessment for Image/Video With Compression Artifacts., , , , and . IEEE Access, (2020)Digital Business and Economic Complexity.. J. Comput. Inf. Syst., 63 (1): 162-175 (January 2023)Automated reverse engineering of role-based access control policies of web applications., , , , and . J. Syst. Softw., (2022)A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System., , and . IEEE Signal Process. Lett., 18 (2): 95-98 (2011)Region-of-interest tracking method for video plus depth coding., , , , and . ICEIC, page 1-4. IEEE, (2014)Overcoming the Rare Word Problem for low-resource language pairs in Neural Machine Translation., , , and . WAT@EMNLP-IJCNLP, page 207-214. Association for Computational Linguistics, (2019)Relative Positional Encoding for Speech Recognition and Direct Translation., , , , , , , and . INTERSPEECH, page 31-35. ISCA, (2020)Reducing Blocking Artifacts in CNN-Based Image Steganography by Additional Loss Functions., , , and . KSE, page 61-66. IEEE, (2020)