From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption., , и . CHES, том 10529 из Lecture Notes in Computer Science, стр. 513-533. Springer, (2017)A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion.. ICISC, том 2587 из Lecture Notes in Computer Science, стр. 343-358. Springer, (2002)Spectre Attacks: Exploiting Speculative Execution., , , , , , , , , и . CoRR, (2018)A new approach to DNS security (DNSSEC)., и . ACM Conference on Computer and Communications Security, стр. 86-95. ACM, (2001)ScatterCache: Thwarting Cache Attacks via Cache Set Randomization., , , , , и . USENIX Security Symposium, стр. 675-692. USENIX Association, (2019)SCRAMBLE-CFI: Mitigating Fault-Induced Control-Flow Attacks on OpenTitan., и . ACM Great Lakes Symposium on VLSI, стр. 45-50. ACM, (2023)DOPE: DOmain Protection Enforcement with PKS., , , , и . ACSAC, стр. 662-676. ACM, (2023)Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures., , , , , и . ASIACRYPT (2), том 11273 из Lecture Notes in Computer Science, стр. 315-342. Springer, (2018)Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives., , и . AsiaCCS, стр. 690-702. ACM, (2017)CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory., , , , , и . CoRR, (2020)