From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?, и . WISA, том 5932 из Lecture Notes in Computer Science, стр. 51-65. Springer, (2009)CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory., , , , , и . CoRR, (2020)Side-Channel Leakage across Borders., , , , , и . CARDIS, том 6035 из Lecture Notes in Computer Science, стр. 36-48. Springer, (2010)A Fault Attack on ECDSA., и . FDTC, стр. 93-99. IEEE Computer Society, (2009)IoT Security Challenges and Ways Forward.. TrustED@CCS, стр. 55. ACM, (2016)Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices., , , и . AFRICACRYPT, том 6055 из Lecture Notes in Computer Science, стр. 279-296. Springer, (2010)Energy evaluation of software implementations of block ciphers under memory constraints., , , , и . DATE, стр. 1110-1115. EDA Consortium, San Jose, CA, USA, (2007)Template Attacks on ECDSA., и . WISA, том 5379 из Lecture Notes in Computer Science, стр. 14-27. Springer, (2008)Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation., и . WISA, том 5379 из Lecture Notes in Computer Science, стр. 1-13. Springer, (2008)Extractors against Side-Channel Attacks: Weak or Strong?, и . CHES, том 6917 из Lecture Notes in Computer Science, стр. 256-272. Springer, (2011)