From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A comprehensive high-level synthesis system for control-flow intensive behaviors., , , , , , , , и . ACM Great Lakes Symposium on VLSI, стр. 11-14. ACM, (2003)A statistics-based success rate model for DPA and CPA., , , и . J. Cryptogr. Eng., 5 (4): 227-243 (2015)A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks., , , и . ASIACRYPT (2), том 9453 из Lecture Notes in Computer Science, стр. 338-360. Springer, (2015)A Timing Side-Channel Attack on a Mobile GPU., , , и . ICCD, стр. 67-74. IEEE Computer Society, (2018)Compiler-Assisted Threshold Implementation against Power Analysis Attacks., , , , , , и . ICCD, стр. 541-544. IEEE Computer Society, (2017)An Energy-Aware Framework for Coordinated Dynamic Software Management in Mobile Computers., , и . MASCOTS, стр. 306-317. IEEE Computer Society, (2004)A Novel GPU Overdrive Fault Attack., , и . DAC, стр. 1-6. IEEE, (2020)A complete key recovery timing attack on a GPU., , и . HPCA, стр. 394-405. IEEE Computer Society, (2016)Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks., , , , , и . DAC, стр. 165. ACM, (2019)Side-channel power analysis of XTS-AES., , и . DATE, стр. 1330-1335. IEEE, (2017)