From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Algebraic Side-Channel Attacks Against ACORN., , и . ICISC, том 11396 из Lecture Notes in Computer Science, стр. 325-340. Springer, (2018)Lightweight Yet Nonce-Misuse Secure Authenticated Encryption for Very Short Inputs., , и . IEEE Internet Things J., 12 (3): 2807-2824 (февраля 2025)Authenticated Encryption for Very Short Inputs., , и . CT-RSA, том 13871 из Lecture Notes in Computer Science, стр. 553-572. Springer, (2023)Revisiting Keccak and Dilithium Implementations on ARMv7-M., , , , , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (2): 1-24 (2024)Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation., , и . ACISP, том 13494 из Lecture Notes in Computer Science, стр. 125-144. Springer, (2022)Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round., , и . INDOCRYPT, том 10698 из Lecture Notes in Computer Science, стр. 65-84. Springer, (2017)Hardware Security Threats Against Bluetooth Mesh Networks., , и . CNS, стр. 1-9. IEEE, (2018)