From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Unified Approach to Canonical Form-based Boolean Matching., , , и . DAC, стр. 841-846. IEEE, (2007)SMaC: spatial map caching technique for mobile devices., и . SAC, стр. 1829-1830. ACM, (2010)Supporting Concurrency in Private Data Outsourcing., , , , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 648-664. Springer, (2011)Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features., и . DAC, стр. 120:1-120:6. ACM, (2018)Quantum Computing Research Lines in the Italian Center for Supercomputing., , и . SAMOS, том 14385 из Lecture Notes in Computer Science, стр. 423-434. Springer, (2023)Encasing block ciphers to foil key recovery attempts via side channel., , , и . ICCAD, стр. 96. ACM, (2016)A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems., , и . SecureComm (2), том 399 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 458-474. Springer, (2021)Performance Bounds for QC-MDPC Codes Decoders., , , , и . CBCrypto, том 13150 из Lecture Notes in Computer Science, стр. 95-122. Springer, (2021)Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions., , , , и . ICECS, стр. 739-742. IEEE, (2019)Low Voltage Fault Attacks to AES., , , , и . HOST, стр. 7-12. IEEE Computer Society, (2010)