Author of the publication

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.

, , , , , and . FDTC, page 41-51. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Freeway ramp metering by macroscopic traffic scheduling with particle swarm optimization., , and . CIVTS, page 32-37. IEEE, (2013)Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers., , , and . Sci. China Inf. Sci., 61 (3): 039106:1-039106:3 (2018)Improved Differential Fault Analysis of SOSEMANUK with Algebraic Techniques., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (3): 811-821 (2017)Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance., , , , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 480-496. Springer, (2019)Persistent Fault Attack in Practice., , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (2): 172-195 (2020)Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher., , , , , , and . Secur. Commun. Networks, (2017)Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models., , , , , and . DAC, page 1-6. IEEE, (2023)Enhanced Side-Channel Cube Attacks on PRESENT., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 332-339 (2013)HTS filter subsystem for future mobile communication system., , , , , and . Sci. China Ser. F Inf. Sci., 51 (9): 1384-1390 (2008)A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers., , , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (5): 1039-1054 (2016)