Author of the publication

Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.

, , , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 41-57. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bit Error Probability Evaluation of RO PUFs., , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 421-436. Springer, (2015)HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware., , , and . IACR Cryptology ePrint Archive, (2013)Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields., , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 292-306. Springer, (2016)Entropy Evaluation for Oscillator-Based True Random Number Generators., , , , , and . CHES, volume 8731 of Lecture Notes in Computer Science, page 544-561. Springer, (2014)Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA., , , , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 105-118. Springer, (2012)An Intelligent Sorting Method of Film in Cotton Combining Hyperspectral Imaging and the AlexNet-PCA Algorithm., , , , and . Sensors, 23 (16): 7041 (August 2023)Boosting Entropy Extraction of PDL-based RO PUF by High-order Difference Method., , , and . ACM Great Lakes Symposium on VLSI, page 59-64. ACM, (2020)High Radix Montgomery Modular Multiplier on Modern FPGA., , , and . TrustCom/ISPA/IUCC, page 1484-1489. IEEE Computer Society, (2013)TST: A New Randomness Test Method Based on Coupon Collector's Problem., , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 362-373. Springer, (2014)Flush+Time: A High Accuracy and High Resolution Cache Attack On ARM-FPGA Embedded SoC., , , , and . VTS, page 1-6. IEEE, (2020)