Author of the publication

Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers.

, , , , , and . EuroS&P Workshops, page 113-121. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization., , , , , and . IACR Cryptol. ePrint Arch., (2022)Efficient Modular Polynomial Multiplier for NTT Accelerator of Crystals-Kyber., , and . DSD, page 528-533. IEEE, (2022)Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation., , and . COSADE, volume 10348 of Lecture Notes in Computer Science, page 50-64. Springer, (2017)An Efficient Approach to Verifying Galois-Field Arithmetic Circuits of Higher Degrees and Its Application to ECC Decoders., , , and . ISMVL, page 144-149. IEEE Computer Society, (2014)Quaternary Debiasing for Physically Unclonable Functions., , , and . ISMVL, page 7-12. IEEE Computer Society, (2018)Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-., , , , , , , , , and 9 other author(s). ICCAD, page 141:1-141:6. IEEE, (2020)Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design., , , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 63-80. Springer, (2015)Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks., , , and . IACR Cryptol. ePrint Arch., (2023)Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs., , , , , and . IACR Cryptol. ePrint Arch., (2021)Unified Hardware for High-Throughput AES-Based Authenticated Encryptions., , and . IEEE Trans. Circuits Syst. II Express Briefs, 67-II (9): 1604-1608 (2020)