Author of the publication

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.

, , , , , and . FDTC, page 41-51. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Over-The-Air Firmware Updates for Sensor Networks., , , , , , and . MASS Workshops, page 97-100. IEEE, (2019)RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements., , , and . IEEE Communications Magazine, 54 (2): 32-38 (2016)Enhanced Side-Channel Cube Attacks on PRESENT., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 332-339 (2013)MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation., , , , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 231-248. Springer, (2012)An Output Probabilistic Constrained Optimal Control Algorithm Based on Multivariable MAC and its Application in Looper Control System., , and . IEEE Access, (2019)Accelerating higher-order masking of AES using composite field and SIMD., , , and . ISSPIT, page 575-580. IEEE Computer Society, (2015)Algebraic Side-Channel Attack on Twofish., , and . J. Internet Serv. Inf. Secur., 7 (2): 32-43 (2017)Quality Monitoring and Root Cause Diagnosis for Industrial Processes Based on Lasso-SAE-CCA., , , , and . IEEE Access, (2019)Validating Word-Oriented Processors for Bit and Multi-word Operations., , and . Asia-Pacific Computer Systems Architecture Conference, volume 3189 of Lecture Notes in Computer Science, page 473-488. Springer, (2004)A resilient pressure routing scheme for underwater acoustic networks., , , and . GLOBECOM, page 637-642. IEEE, (2014)