From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementation aspects of the DPA-resistant logic style MDPL., и . ISCAS, IEEE, (2006)SCAnDroid: Automated Side-Channel Analysis of Android APIs., , и . WISEC, стр. 224-235. ACM, (2018)Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices., , , и . IEEE Commun. Surv. Tutorials, 20 (1): 465-488 (2018)Meltdown., , , , , , , , , и . CoRR, (2018)Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android., , , и . WISEC, стр. 49-60. ACM, (2016)One for All - All for One: Unifying Standard DPA Attacks., , и . IACR Cryptology ePrint Archive, (2009)Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption., , и . IACR Cryptology ePrint Archive, (2016)Counteracting Power Analysis Attacks by Masking., и . Secure Integrated Circuits and Systems, Springer, (2010)Protecting the Control Flow of Embedded Processors against Fault Attacks., , и . CARDIS, том 9514 из Lecture Notes in Computer Science, стр. 161-176. Springer, (2015)Exploiting the Difference of Side-Channel Leakages., , , , и . COSADE, том 7275 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2012)