From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms., , , , и . Future Gener. Comput. Syst., (2020)Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9., , , , , , и . Secur. Commun. Networks, (2018)Power Analysis and Protection on SPECK and Its Application in IoT., , , , , и . SecureComm (2), том 305 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 350-362. Springer, (2019)A machine learning based golden-free detection method for command-activated hardware Trojan., , , , , и . Inf. Sci., (2020)Power Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart Card., , , , , и . CyberC, стр. 354-359. IEEE, (2019)Practical two-dimensional correlation power analysis and its backward fault-tolerance., , , , и . Sci. China Inf. Sci., 60 (6): 68101 (2017)Searching all truncated impossible differentials in SPN., , , , и . IET Inf. Secur., 11 (2): 89-96 (2017)Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices., , , , , и . Comput. Electr. Eng., (2017)RFA: R-Squared Fitting Analysis Model for Power Attack., , , , , и . Secur. Commun. Networks, (2017)Efficient collision attacks on smart card implementations of masked AES., , , , , , и . Sci. China Inf. Sci., 58 (5): 1-15 (2015)