Author of the publication

EM Leakage of RFID Devices - Comparison of Two Measurement Approaches.

, and . ARES, page 120-125. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Side-Channel Leakage across Borders., , , , , and . CARDIS, volume 6035 of Lecture Notes in Computer Science, page 36-48. Springer, (2010)On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices., , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 163-177. Springer, (2009)Susceptibility of UHF RFID Tags to Electromagnetic Analysis.. CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 288-300. Springer, (2008)Semi-passive RFID development platform for implementing and attacking security tags., , , , , and . ICITST, page 1-6. IEEE, (2010)Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 21 (11): 1965-1974 (2013)An ECDSA Processor for RFID Authentication., , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 189-202. Springer, (2010)On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems., , and . ARES, page 230-235. IEEE Computer Society, (2013)On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID Tags., and . ARES, page 38-46. IEEE Computer Society, (2012)Optical Fault Attacks on AES: A Threat in Violet., , and . FDTC, page 13-22. IEEE Computer Society, (2009)On the Applicability of Time-Driven Cache Attacks on Mobile Devices., and . NSS, volume 7873 of Lecture Notes in Computer Science, page 656-662. Springer, (2013)