Author of the publication

A Second Look at the ASCAD Databases.

, , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 75-99. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Side-Channel Analysis and Countermeasures for Physical Unclonable Functions: Ring-Based PUF Primitives, Bit Derivation and BCH Codes.. Technical University of Munich, Germany, (2023)Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA., , , and . IEEE Trans. Inf. Forensics Secur., (2021)A Second Look at the ASCAD Databases., , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 75-99. Springer, (2022)Self-secured PUF: Protecting the Loop PUF by Masking., , and . COSADE, volume 12244 of Lecture Notes in Computer Science, page 293-314. Springer, (2020)Analysis and Protection of the Two-Metric Helper Data Scheme., , , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 279-302. Springer, (2021)Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs - An Evaluation of the ASCAD Databases., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 139-158. Springer, (2023)Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers., , , , , and . IACR Cryptol. ePrint Arch., (2020)On-Chip Side-Channel Analysis of the Loop PUF., , and . ASHES@CCS, page 55-63. ACM, (2022)Side-Channel Analysis of the TERO PUF., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 43-60. Springer, (2019)