From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Hidden Leakages., , и . IACR Cryptology ePrint Archive, (2013)A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness., и . IACR Cryptology ePrint Archive, (2018)Vulnerability modeling of cryptographic hardware to power analysis attacks., , , и . Integr., 42 (4): 468-478 (2009)Glitch-free is not Enough - Revisiting Glitch-Extended Probing Model., , и . IACR Cryptol. ePrint Arch., (2023)Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA., , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (3): 496-519 (2021)ParTI: Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks., , и . TIS@CCS, стр. 39. ACM, (2016)Statistical Tools Flavor Side-Channel Collision Attacks.. EUROCRYPT, том 7237 из Lecture Notes in Computer Science, стр. 428-445. Springer, (2012)Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order., , и . COSADE, том 9689 из Lecture Notes in Computer Science, стр. 199-217. Springer, (2016)Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations., и . CHES, том 9293 из Lecture Notes in Computer Science, стр. 495-513. Springer, (2015)DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations., , и . IACR Cryptology ePrint Archive, (2019)