Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low power DSP's for wireless communications (embedded tutorial session)., and . ISLPED, page 303-310. ACM, (2000)Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption., , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 68-81. Springer, (2012)Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis., , , and . IACR Cryptology ePrint Archive, (2009)An Elliptic Curve Processor Suitable For RFID-Tags., , , , , and . IACR Cryptology ePrint Archive, (2006)A survey of Hardware-based Control Flow Integrity (CFI), and . (2017)cite arxiv:1706.07257.A Note on the Use of Margins to Compare Distinguishers., , and . COSADE, volume 8622 of Lecture Notes in Computer Science, page 1-8. Springer, (2014)Highly efficient entropy extraction for true random number generators on FPGAs., , , and . DAC, page 116:1-116:6. ACM, (2015)Design and Implementation of a Waveform-Matching Based Triggering System., , , and . COSADE, volume 9689 of Lecture Notes in Computer Science, page 184-198. Springer, (2016)Superscalar Coprocessor for High-Speed Curve-Based Cryptography., , , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 415-429. Springer, (2006)Architectural Design Features of a Programmable High Throughput AES Coprocessor., , and . ITCC (2), page 498-502. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.