Author of the publication

Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool.

, and . ITNG, page 359-365. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DSP implementation of OFDM acoustic modem., , , and . Underwater Networks, page 89-92. ACM, (2007)An Advanced GNU Radio Receiver of IEEE 802.15.4 OQPSK Physical Layer., , , , , and . IEEE Internet Things J., 8 (11): 9206-9218 (2021)Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors., , , and . ICCD, page 187-193. IEEE, (2007)An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms., and . ITNG, page 120-126. IEEE Computer Society, (2008)Alternative application-specific processor architectures for fast arbitrary bit permutations., , and . Int. J. Embed. Syst., 3 (4): 219-228 (2008)A vulnerability study of geographic routing in Underwater Acoustic Networks., , , and . CNS, page 109-117. IEEE, (2013)Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-Set Processors., , , and . IEEE Trans. Very Large Scale Integr. Syst., 18 (11): 1519-1532 (2010)SoK: Sharding on Blockchain., , , and . AFT, page 41-61. ACM, (2019)Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering., , , , , , and . FDTC, page 29-39. IEEE Computer Society, (2014)Chord-Based Key Establishment Schemes for Sensor Networks., , and . ITNG, page 731-737. IEEE Computer Society, (2008)