Author of the publication

Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms.

, , , , and . Future Gener. Comput. Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms., , , , and . Future Gener. Comput. Syst., (2020)Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9., , , , , , and . Secur. Commun. Networks, (2018)Power Analysis and Protection on SPECK and Its Application in IoT., , , , , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 350-362. Springer, (2019)A machine learning based golden-free detection method for command-activated hardware Trojan., , , , , and . Inf. Sci., (2020)Power Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart Card., , , , , and . CyberC, page 354-359. IEEE, (2019)Practical two-dimensional correlation power analysis and its backward fault-tolerance., , , , and . Sci. China Inf. Sci., 60 (6): 68101 (2017)Searching all truncated impossible differentials in SPN., , , , and . IET Inf. Secur., 11 (2): 89-96 (2017)Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices., , , , , and . Comput. Electr. Eng., (2017)RFA: R-Squared Fitting Analysis Model for Power Attack., , , , , and . Secur. Commun. Networks, (2017)Some properties of the cycle decomposition of WG-NLFSR., , , and . Adv. Math. Commun., 15 (1): 155-165 (2021)