Author of the publication

Exploiting Security Vulnerabilities in Intermittent Computing.

, and . SPACE, volume 11348 of Lecture Notes in Computer Science, page 104-124. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a Virtual Framework for Networked Reconfigurable Hardware and Software Objects., , , , and . PDPTA, CSREA Press, (2000)A Robust Physical Unclonable Function With Enhanced Challenge-Response Set., , and . IEEE Trans. Inf. Forensics Secur., 7 (1): 333-345 (2012)A novel microprocessor-intrinsic Physical Unclonable Function., and . FPL, page 380-387. IEEE, (2012)A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing., , , , , , and . DAC, page 222-227. ACM, (2005)Cooperative multithreading on 3mbedded multiprocessor architectures enables energy-scalable design., , , and . DAC, page 27-30. ACM, (2005)QMS: Evaluating the Side-Channel Resistance of Masked Software from Source Code., , , and . DAC, page 209:1-209:6. ACM, (2014)Eliminating timing side-channel leaks using program repair., , , and . ISSTA, page 15-26. ACM, (2018)A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication., , and . Int. J. Reconfigurable Comput., (2012)A Component-Based Design Environment for ESL Design., and . IEEE Des. Test Comput., 23 (5): 338-347 (2006)SIA: Secure Intermittent Architecture for Off-the-Shelf Resource-Constrained Microcontrollers., , and . HOST, page 208-217. IEEE, (2019)