Author of the publication

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.

, , , , , and . FDTC, page 41-51. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation., , , , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 231-248. Springer, (2012)An Output Probabilistic Constrained Optimal Control Algorithm Based on Multivariable MAC and its Application in Looper Control System., , and . IEEE Access, (2019)RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements., , , and . IEEE Communications Magazine, 54 (2): 32-38 (2016)Enhanced Side-Channel Cube Attacks on PRESENT., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 332-339 (2013)Secure Over-The-Air Firmware Updates for Sensor Networks., , , , , , and . MASS Workshops, page 97-100. IEEE, (2019)Accelerating higher-order masking of AES using composite field and SIMD., , , and . ISSPIT, page 575-580. IEEE Computer Society, (2015)Distributed Algorithms for Energy-Efficient Even Self-Deployment in Mobile Sensor Networks., , , , and . IEEE Trans. Mob. Comput., 13 (5): 1035-1047 (2014)SDRT: A reliable data transport protocol for underwater sensor networks., , , , and . Ad Hoc Networks, 8 (7): 708-722 (2010)Algebraic Differential Fault Attacks on LED using a Single Fault Injection., , , , , and . IACR Cryptology ePrint Archive, (2012)On Permutation Operations in Cipher Design., , , , and . ITCC (2), page 569-577. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.