Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks., , , , , and . J. Cryptol., 30 (2): 373-391 (2017)Rotary coding for power reduction and S/N improvement in inductive-coupling data communication., , , and . A-SSCC, page 205-208. IEEE, (2011)An 11Gb/s Inductive-Coupling Link with Burst Transmission., , , , , and . ISSCC, page 298-299. IEEE, (2008)A 7Gb/s/link non-contact memory module for multi-drop bus system using energy-equipartitioned coupled transmission line., , , , , , and . ISSCC, page 52-54. IEEE, (2012)6W/25mm2 inductive power transfer for non-contact wafer-level testing., , , , , , and . ISSCC, page 230-232. IEEE, (2011)A 12Gb/s non-contact interface with coupled transmission lines., , , , , and . ISSCC, page 492-494. IEEE, (2011)A 12.5Gb/s/link non-contact multi drop bus system with impedance-matched transmission line couplers and Dicode partial-response channel transceivers., , , , , and . CICC, page 1-4. IEEE, (2012)More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach., , , , and . IWDW, volume 13180 of Lecture Notes in Computer Science, page 87-101. Springer, (2021)A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule., , , , , , and . ISITA, page 382-386. IEEE, (2020)A local EM-analysis attack resistant cryptographic engine with fully-digital oscillator-based tamper-access sensor., , , , , , and . VLSIC, page 1-2. IEEE, (2014)