From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption., , и . CHES, том 10529 из Lecture Notes in Computer Science, стр. 513-533. Springer, (2017)A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion.. ICISC, том 2587 из Lecture Notes in Computer Science, стр. 343-358. Springer, (2002)Spectre Attacks: Exploiting Speculative Execution., , , , , , , , , и . CoRR, (2018)A new approach to DNS security (DNSSEC)., и . ACM Conference on Computer and Communications Security, стр. 86-95. ACM, (2001)Securing conditional branches in the presence of fault attacks., , и . DATE, стр. 1586-1591. IEEE, (2018)Side-channel plaintext-recovery attacks on leakage-resilient encryption., , и . DATE, стр. 1318-1323. IEEE, (2017)Protecting RISC-V Processors against Physical Attacks., , , и . DATE, стр. 1136-1141. IEEE, (2019)CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory., , , , , и . CoRR, (2020)DOPE: DOmain Protection Enforcement with PKS., , , , и . ACSAC, стр. 662-676. ACM, (2023)Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures., , , , , и . ASIACRYPT (2), том 11273 из Lecture Notes in Computer Science, стр. 315-342. Springer, (2018)