Author of the publication

A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs.

, , , , , and . EuroS&P, page 92-106. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications., and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 258-269. Springer, (2010)A Power Reduction Technique Based on Linear Transformations for Block Ciphers.. VLSI-SoC, page 1-6. IEEE, (2022)Resource-efficient cryptography for ubiquitous computing.. Ruhr University Bochum, (2015)Deep Learning Techniques for Side-Channel Analysis on AES Datasets Collected from Hardware and Software Platforms., and . SAMOS, volume 13227 of Lecture Notes in Computer Science, page 300-316. Springer, (2021)A Survey on Authenticated Encryption - ASIC Designer's Perspective., , and . IACR Cryptology ePrint Archive, (2019)A Survey on Authenticated Encryption-ASIC Designer's Perspective., , and . ACM Comput. Surv., 50 (6): 88:1-88:21 (2018)PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning., , , , , and . CoRR, (2022)Analyzing ModuloNET Against Transition Effects., and . COINS, page 1-6. IEEE, (2023)A reconfigurable architecture for searching optimal software code to implement block cipher permutation matrices., , and . ReConFig, page 1-8. IEEE, (2013)Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond., , , , , , and . ICISSP, page 583-591. SciTePress, (2023)