From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel., , , и . USENIX Security Symposium, стр. 515-532. USENIX Association, (2019)Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection., , , , , и . CARDIS, том 8419 из Lecture Notes in Computer Science, стр. 236-252. Springer, (2013)Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes., , , , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 374-390. Springer, (2014)Foundations of Secure Scaling (Dagstuhl Seminar 16342)., , , и . Dagstuhl Reports, 6 (8): 65-90 (2016)Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks., , , и . ACM Trans. Embed. Comput. Syst., 18 (3): 22:1-22:3 (2019)Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis., , , и . IACR Cryptol. ePrint Arch., (2020)Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems., , и . CT-RSA, том 2964 из Lecture Notes in Computer Science, стр. 250-263. Springer, (2004)A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box., , , и . CT-RSA, том 3376 из Lecture Notes in Computer Science, стр. 323-333. Springer, (2005)Xoodyak Under SCA Siege., , , , и . DDECS, стр. 61-66. IEEE, (2024)Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware., , , , , , и . AFRICACRYPT, том 9646 из Lecture Notes in Computer Science, стр. 147-166. Springer, (2016)