From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modified Transparency Order Property: Solution or Just Another Attempt., , , и . SPACE, том 9354 из Lecture Notes in Computer Science, стр. 210-227. Springer, (2015)Online Template Attacks., , , , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 21-36. Springer, (2014)Wide-Weak Privacy-Preserving RFID Authentication Protocols., , , и . MOBILIGHT, том 45 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 254-267. Springer, (2010)The communication and computation cost of wireless security: extended abstract., , , и . WISEC, стр. 1-4. ACM, (2011)Revisiting Higher-Order DPA Attacks: ., , , и . CT-RSA, том 5985 из Lecture Notes in Computer Science, стр. 221-234. Springer, (2010)Practical Evaluation of Protected Residue Number System Scalar Multiplication., , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (1): 259-282 (2019)Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis., , и . CT-RSA, том 7178 из Lecture Notes in Computer Science, стр. 383-397. Springer, (2012)Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection., , , , , и . CARDIS, том 8419 из Lecture Notes in Computer Science, стр. 236-252. Springer, (2013)Foundations of Secure Scaling (Dagstuhl Seminar 16342)., , , и . Dagstuhl Reports, 6 (8): 65-90 (2016)CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel., , , и . USENIX Security Symposium, стр. 515-532. USENIX Association, (2019)