Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cache Timing Attacks on Clefia., , , and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 104-118. Springer, (2009)An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines., , , and . INDOCRYPT, volume 7107 of Lecture Notes in Computer Science, page 58-75. Springer, (2011)Design of a Differential Power Analysis Resistant Masked AES S-Box., , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 373-383. Springer, (2007)A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and Its Application to RS-Coded MPSK Modulation., , and . ACRI, volume 4173 of Lecture Notes in Computer Science, page 204-214. Springer, (2006)Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms., and . CHES, volume 9293 of Lecture Notes in Computer Science, page 248-266. Springer, (2015)Group Properties of Non-linear Cellular Automata.. J. Cell. Autom., 5 (1-2): 139-155 (2010)A Novel Attack on a FPGA based True Random Number Generator., , and . WESS, page 6. ACM, (2015)Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs., , and . CHES, volume 7428 of Lecture Notes in Computer Science, page 494-511. Springer, (2012)Khudra: A New Lightweight Block Cipher for FPGAs., and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 126-145. Springer, (2014)Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?, , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 14-27. Springer, (2014)