From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Constrained Search for a Class of Good Bijective S-Boxes With Improved DPA Resistivity., , и . IEEE Trans. Inf. Forensics Secur., 8 (12): 2154-2163 (2013)Modified Transparency Order Property: Solution or Just Another Attempt., , , и . SPACE, том 9354 из Lecture Notes in Computer Science, стр. 210-227. Springer, (2015)TTLock: Tenacious and traceless logic locking., , , и . HOST, стр. 166. IEEE Computer Society, (2017)Security Analysis of ASCON Cipher Under Persistent Faults - Official Work-in-Progress Paper., и . SPACE, том 15351 из Lecture Notes in Computer Science, стр. 69-79. Springer, (2024)Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?, , и . SPACE, том 8804 из Lecture Notes in Computer Science, стр. 14-27. Springer, (2014)Security analysis of Anti-SAT., , , и . ASP-DAC, стр. 342-347. IEEE, (2017)Design for Security of Block Cipher S-Boxes to Resist Differential Power Attacks., , и . VLSI Design, стр. 113-118. IEEE Computer Society, (2012)Redefining the transparency order., , , , , и . Des. Codes Cryptogr., 82 (1-2): 95-115 (2017)CamoPerturb: secure IC camouflaging for minterm protection., , , и . ICCAD, стр. 29. ACM, (2016)Classical Cryptanalysis Attacks on Logic Locking Techniques., , , , и . J. Electron. Test., 35 (5): 641-654 (2019)