Author of the publication

A Machine Learning Approach Against a Masked AES.

, , , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 61-75. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Higher Order Side-Channel Attacks Resilient S-boxes., , , and . IACR Cryptology ePrint Archive, (2018)A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures., and . Security and Management, page 314-317. CSREA Press, (2009)A note on "new quantum key agreement protocols based on Bell states"., and . Quantum Inf. Process., 20 (2): 74 (2021)Automating Feature Extraction and Feature Selection in Big Data Security Analytics., and . ICAISC (2), volume 10842 of Lecture Notes in Computer Science, page 423-432. Springer, (2018)Anonymous Fair Auction on Blockchain., , , , and . NTMS, page 1-5. IEEE, (2021)A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme., , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 282-288. Springer, (2013)Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics., and . ICDIS, page 43-48. IEEE, (2018)MicroLET: A New SDNoC-Based Communication Protocol for ChipLET-Based Systems., , , , , and . DSD, page 61-68. IEEE, (2019)A SDN solution for system-on-chip world., , , and . SDS, page 14-19. IEEE, (2018)Vertical Handover Security in 4G Heterogeneous Networks: Threat Analysis and Open Challenges., , and . FGIT, volume 7709 of Lecture Notes in Computer Science, page 7-14. Springer, (2012)