Author of the publication

Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.

, , , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 41-57. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge Graph Embedding with Order Information of Triplets., , , , and . PAKDD (3), volume 11441 of Lecture Notes in Computer Science, page 476-488. Springer, (2019)Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields., , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 292-306. Springer, (2016)More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A., , , , and . APSEC, page 410-417. IEEE, (2019)Leveraging Knowledge Context Information to Enhance Personalized Recommendation., , , , and . ICONIP (3), volume 12534 of Lecture Notes in Computer Science, page 467-478. Springer, (2020)Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC., , , , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 197-217. Springer, (2018)A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm., , , , , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 217-231. Springer, (2014)PLVCG: A Pretraining Based Model for Live Video Comment Generation., , , and . PAKDD (2), volume 12713 of Lecture Notes in Computer Science, page 690-702. Springer, (2021)User Preference Excitation Network for Sequential Recommendation., , , and . ISPA/BDCloud/SocialCom/SustainCom, page 433-440. IEEE, (2020)The Application of Network Based Embedding in Local Topic Detection from Social Media., , , , , and . ICTAI, page 1311-1319. IEEE, (2019)SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks., , , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 251-268. Springer, (2019)