Author of the publication

It Started with Templates: The Future of Profiling in Side-Channel Analysis.

, , , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of broad-band power amplifiers by means of an impedance transforming lossy equalizer., , , , and . MIXDES, page 189-193. IEEE, (2014)It Started with Templates: The Future of Profiling in Side-Channel Analysis., , , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)Application of Apriori Algorithm for CRM Improvement - Case Study from Montenegro., , , , and . ICCTA, page 48-56. ACM, (2022)Leakage Power Analysis attacks: Effectiveness on DPA resistant logic styles under process variations., , , , and . ISCAS, page 2043-2046. IEEE, (2011)Template attacks exploiting static power and application to CMOS lightweight crypto-hardware., , , and . I. J. Circuit Theory and Applications, 45 (2): 229-241 (2017)Driving Sustainability: Carbon Footprint, 3D Printing, and Legislation concerning Electric and Autonomous Vehicles., , , , and . Sensors, 23 (22): 9104 (November 2023)Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications., , , and . AFRICACRYPT, volume 10239 of Lecture Notes in Computer Science, page 79-94. (2017)Effectiveness of Leakage Power Analysis Attacks on DPA-Resistant Logic Styles Under Process Variations., , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 61-I (2): 429-442 (2014)