From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium., , , , и . IACR Cryptol. ePrint Arch., (2023)Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed., , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (2): 256-292 (2019)Cyber Resilience for Self-Monitoring IoT Devices., , , , и . CSR, стр. 160-167. IEEE, (2021)ExplAIn Yourself! Transparency for Positive UX in Autonomous Driving., , , , , и . CHI, стр. 161:1-161:12. ACM, (2021)Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order., , и . COSADE, том 9689 из Lecture Notes in Computer Science, стр. 199-217. Springer, (2016)Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations., и . CHES, том 9293 из Lecture Notes in Computer Science, стр. 495-513. Springer, (2015)10 Gbit/s bidirectional optical wireless communication module for docking devices., , и . GLOBECOM Workshops, стр. 512-517. IEEE, (2014)Multi-Tuple Leakage Detection and the Dependent Signal Issue., , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (2): 318-345 (2019)Impeccable Circuits., , , , и . IACR Cryptology ePrint Archive, (2018)Reducing risks through simplicity: high side-channel security for lazy engineers., , и . J. Cryptogr. Eng., 11 (1): 39-55 (2021)