Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols., , , , and . ACM Trans. Embed. Comput. Syst., 20 (6): 110:1-110:22 (2021)A Flexible and Compact Hardware Architecture for the SIMON Block Cipher., , and . LightSec, volume 8898 of Lecture Notes in Computer Science, page 34-50. Springer, (2014)Low cost FPGA design and implementation of a stereo matching system for 3D-TV applications., , and . VLSI-SoC, page 204-209. IEEE, (2013)PASC: Physically authenticated stable-clocked soc platform on low-cost FPGAs., and . ReConFig, page 1-6. IEEE, (2013)A Survey of Software Implementations for the Number Theoretic Transform., , , , , and . SAMOS, volume 14385 of Lecture Notes in Computer Science, page 328-344. Springer, (2023)SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation., , , , and . IACR Cryptol. ePrint Arch., (2021)SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs., , and . ISCAS, page 1-5. IEEE, (2023)A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature., and . HOST, page 90-100. IEEE, (2024)Apple vs. EMA: electromagnetic side channel attacks on apple CoreCrypto., and . DAC, page 247-252. ACM, (2022)Digital fingerprints for low-cost platforms using MEMS sensors., , , , and . WESS, page 2:1-2:6. ACM, (2013)