From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the entropy of Physically Unclonable Functions., , , и . ISIT, стр. 2928-2932. IEEE, (2016)Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings., , , , , , и . COSADE, том 13979 из Lecture Notes in Computer Science, стр. 86-104. Springer, (2023)Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy., , , , и . ISIT, стр. 654-659. IEEE, (2023)Bent Sequences over Hadamard Codes for Physically Unclonable Functions., , , и . ISIT, стр. 801-806. IEEE, (2021)Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations., , , , , , и . ITW, стр. 81-86. IEEE, (2023)Fast algorithms for the continuous wavelet transform.. ICASSP, стр. 2213-2216. IEEE Computer Society, (1991)At Every Corner: Determining Corner Points of Two-User Gaussian Interference Channels.. CoRR, (2016)On some almost properties., и . ITA, стр. 1-5. IEEE, (2016)BIGnav: Bayesian Information Gain for Guiding Multiscale Navigation., , , и . CHI, стр. 5869-5880. ACM, (2017)Be My Guesses: The interplay between side-channel leakage metrics., , , и . Microprocess. Microsystems, (2024)