Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fast dual-field modular arithmetic logic unit and its hardware implementation., , and . ISCAS, IEEE, (2006)Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts., , , , , , and . FPS, volume 8352 of Lecture Notes in Computer Science, page 272-287. Springer, (2013)Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks., , , , and . ISQED, page 1. IEEE, (2022)Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller., , and . GCCE, page 181-185. IEEE, (2020)Arithmetic for Public-Key Cryptography., and . Secure Integrated Circuits and Systems, Springer, (2010)Exploring the Relations between Fault Sensitivity and Power Consumption., , , , , , , , and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 137-153. Springer, (2013)Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function., , , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 170-181. Springer, (2012)A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme., , , and . SECITC, volume 12001 of Lecture Notes in Computer Science, page 78-94. Springer, (2019)A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA., , , and . FedCSIS, volume 2 of Annals of Computer Science and Information Systems, page 871-878. (2014)A New Approach for Implementing the MPL Method toward Higher SPA Resistance., , and . ARES, page 181-186. IEEE Computer Society, (2009)