Author of the publication

A Tolerant Algebraic Side-Channel Attack on AES Using CP.

, , , , and . CP, volume 10416 of Lecture Notes in Computer Science, page 189-205. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis tools for computational imaging systems., , and . Visual Information Processing, volume 5817 of SPIE Proceedings, page 34-44. SPIE, (2005)Performance analysis of a user-level memory server., and . CLUSTER, page 249-258. IEEE Computer Society, (2007)On the Feasibility of Incremental Checkpointing for Scientific Computing., , , , and . IPDPS, IEEE Computer Society, (2004)Real Time Wavefront Coded Microscopy., , , and . PICS, page 67-71. IS&T - The Society for Imaging Science and Technology, (2003)Optimized InfiniBandTM fat-tree routing for shift all-to-all communication patterns., , , and . Concurr. Comput. Pract. Exp., 22 (2): 217-231 (2010)Panel 3: The Future Visualization Platform., , , , , and . IEEE Visualization, page 569-571. IEEE Computer Society, (2004)A Performance and Scalability Analysis of the BlueGene/L Architecture., , , , , , and . SC, page 41. IEEE Computer Society, (2004)Implementation and performance modeling of deterministic particle transport (Sweep3D) on the IBM Cell/B.E., , , and . Sci. Program., 17 (1-2): 199-208 (2009)Architecture - A performance comparison through benchmarking and modeling of three leading supercomputers: blue Gene/L, Red Storm, and Purple., , , , and . SC, page 74. ACM Press, (2006)A Tolerant Algebraic Side-Channel Attack on AES Using CP., , , , and . CP, volume 10416 of Lecture Notes in Computer Science, page 189-205. Springer, (2017)