From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blind Side Channel on the Elephant LFSR., , , , и . SECRYPT, стр. 25-34. SCITEPRESS, (2022)How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions., , , , , и . ProvSec, том 5324 из Lecture Notes in Computer Science, стр. 241-253. Springer, (2008)De la sécurité physique des crypto-systèmes embarqués. (On physical security of embedded systems).. Versailles Saint-Quentin-en-Yvelines University, France, (2007)Case Study of a Fault Attack on Asynchronous DES Crypto-Processors., , , , и . FDTC, том 4236 из Lecture Notes in Computer Science, стр. 88-97. Springer, (2006)New Families of ECM Curves for Cunningham Numbers., и . ANTS, том 6197 из Lecture Notes in Computer Science, стр. 96-109. Springer, (2010)Differential Power Analysis in the Presence of Hardware Countermeasures., , и . CHES, том 1965 из Lecture Notes in Computer Science, стр. 252-263. Springer, (2000)Quadrivariate Improved Blind Side-Channel Analysis on Boolean Masked AES., , и . COSADE, том 10815 из Lecture Notes in Computer Science, стр. 153-167. Springer, (2018)Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis., и . COSADE, том 7864 из Lecture Notes in Computer Science, стр. 80-98. Springer, (2013)Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes., , , и . SECRYPT, стр. 518-527. SCITEPRESS, (2024)Fault Analysis Study of IDEA., , и . CT-RSA, том 4964 из Lecture Notes in Computer Science, стр. 274-287. Springer, (2008)