From post

Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments.

. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (3): 202-232 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unrolled Cryptography on Silicon A Physical Security Analysis.. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (4): 416-442 (2020)PRINCEv2 - More Security for (Almost) No Overhead., , , , , , , , , и . SAC, том 12804 из Lecture Notes in Computer Science, стр. 483-511. Springer, (2020)Low-Latency Hardware Masking of PRINCE., , и . COSADE, том 12910 из Lecture Notes in Computer Science, стр. 148-167. Springer, (2021)Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations., , , , , и . SP, стр. 56-74. IEEE, (2023)Combined Private Circuits - Combined Security Refurbished., , , , , , и . CCS, стр. 990-1004. ACM, (2023)DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations., , и . IACR Cryptology ePrint Archive, (2019)Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA., , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (3): 496-519 (2021)The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs., , и . ETS, стр. 1-6. IEEE, (2020)Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed., , , и . IACR Cryptology ePrint Archive, (2018)Static power side-channel analysis of a threshold implementation prototype chip., , и . DATE, стр. 1324-1329. IEEE, (2017)