Author of the publication

Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak.

, , , , and . IACR Cryptol. ePrint Arch., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion., , , and . IACR Cryptology ePrint Archive, (2018)Secure and Efficient Initialization and Authentication Protocols for SHIELD., and . IACR Cryptology ePrint Archive, (2015)HaTCh: Hardware Trojan Catcher., , , , , and . IACR Cryptology ePrint Archive, (2014)MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks., , , , and . IACR Cryptology ePrint Archive, (2017)A Survey of Cybersecurity and Resilience of Digital Manufacturing., , , , , , , and . CoRR, (2020)Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems., , and . ICPS, page 824-829. IEEE, (2018)New clone-detection approach for RFID-based supply chains., , , and . HOST, page 122-127. IEEE Computer Society, (2017)Simulation and analysis of negative-bias temperature instability aging on power analysis attacks., , , , and . HOST, page 124-129. IEEE Computer Society, (2015)PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers., , , , and . IACR Trans. Symmetric Cryptol., 2021 (3): 170-217 (2021)Proof of aliveness., , , and . ACSAC, page 1-16. ACM, (2019)