Author of the publication

Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.

, , , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 41-57. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Graph Link Prediction by Semantic Evolution., , , , , and . ICC, page 1-6. IEEE, (2019)AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC., , , , and . ICCD, page 585-593. IEEE, (2019)CARec: Content-Aware Point-of-Interest Recommendation via Adaptive Bayesian Personalized Ranking., , , , and . Aust. J. Intell. Inf. Process. Syst., 15 (3): 61-68 (2019)Reducing Style Overfitting for Character Recognition via Parallel Neural Networks with Style to Content Connection., , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 784-791. IEEE, (2019)Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks., , , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 41-57. Springer, (2016)Personalized Point-of-Interest Recommendation on Ranking with Poisson Factorization., , , , , and . IJCNN, page 1-8. IEEE, (2019)SECL: Separated Embedding and Correlation Learning for Demographic Prediction in Ubiquitous Sensor Scenario., , , , , and . IJCNN, page 1-10. IEEE, (2020)A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia., , , , , and . IACR Cryptol. ePrint Arch., (2015)The Signaling Mechanism of Fairness Concern in E-CLSC., , , and . J. Organ. End User Comput., 35 (1): 1-35 (2023)A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers., , , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 415-434. Springer, (2017)