From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels., , , , и . ACM Conference on Computer and Communications Security, стр. 1626-1638. ACM, (2016)ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs., , , и . CT-RSA, том 9610 из Lecture Notes in Computer Science, стр. 219-235. Springer, (2016)Physical key extraction attacks on PCs., , , , и . Commun. ACM, 59 (6): 70-79 (2016)Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation., , , и . CHES, том 9293 из Lecture Notes in Computer Science, стр. 207-228. Springer, (2015)Drive-By Key-Extraction Cache Attacks from Portable Code., , , и . ACNS, том 10892 из Lecture Notes in Computer Science, стр. 83-102. Springer, (2018)