From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey of Hardware-based Control Flow Integrity (CFI), и . (2017)cite arxiv:1706.07257.Low power DSP's for wireless communications (embedded tutorial session)., и . ISLPED, стр. 303-310. ACM, (2000)Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis., , , и . IACR Cryptology ePrint Archive, (2009)An Elliptic Curve Processor Suitable For RFID-Tags., , , , , и . IACR Cryptology ePrint Archive, (2006)A Note on the Use of Margins to Compare Distinguishers., , и . COSADE, том 8622 из Lecture Notes in Computer Science, стр. 1-8. Springer, (2014)Highly efficient entropy extraction for true random number generators on FPGAs., , , и . DAC, стр. 116:1-116:6. ACM, (2015)A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer., , , , и . CoRR, (2023)A 334µW 0.158mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Extended Version., , , , , , и . IACR Cryptol. ePrint Arch., (2023)BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption., , , , , , , , , и 1 other автор(ы). IACR Cryptol. ePrint Arch., (2022)An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining., и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (4): 88-109 (2022)