Author of the publication

Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC.

, , , , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 197-217. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A., , , , and . APSEC, page 410-417. IEEE, (2019)A survey of knowledge-enhanced pre-trained language models, , , , , and . (November 2022)arXiv:2211.05994 cs.ConvMB: Improving Convolution-Based Knowledge Graph Embeddings by Adopting Multi-Branch 3D Convolution Filters., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 382-389. IEEE, (2021)Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC., , , , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 197-217. Springer, (2018)BusyBot: Learning to Interact, Reason, and Plan in a BusyBoard Environment., , and . CoRL, volume 205 of Proceedings of Machine Learning Research, page 505-515. PMLR, (2022)A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm., , , , , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 217-231. Springer, (2014)QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations., , , , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 184-198. Springer, (2015)Learning from Audience Intelligence: Dynamic Labeled LDA Model for Time-Sync Commented Video Tagging., , , , and . ICONIP (3), volume 11303 of Lecture Notes in Computer Science, page 546-559. Springer, (2018)Recovering a Sum of Two Squares Decomposition Revisited., , , , , , and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 178-192. Springer, (2015)Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System., , , , and . SciSec, volume 13005 of Lecture Notes in Computer Science, page 110-125. Springer, (2021)