From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Revisiting Higher-Order DPA Attacks: ., , , и . CT-RSA, том 5985 из Lecture Notes in Computer Science, стр. 221-234. Springer, (2010)Practical Evaluation of Protected Residue Number System Scalar Multiplication., , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (1): 259-282 (2019)Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection., , , , , и . CARDIS, том 8419 из Lecture Notes in Computer Science, стр. 236-252. Springer, (2013)Foundations of Secure Scaling (Dagstuhl Seminar 16342)., , , и . Dagstuhl Reports, 6 (8): 65-90 (2016)Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes., , , , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 374-390. Springer, (2014)Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware., , , , , , и . AFRICACRYPT, том 9646 из Lecture Notes in Computer Science, стр. 147-166. Springer, (2016)Optimality and beyond: The case of 4×4 S-boxes., , , , и . HOST, стр. 80-83. IEEE Computer Society, (2014)Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems., , и . CT-RSA, том 2964 из Lecture Notes in Computer Science, стр. 250-263. Springer, (2004)A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box., , , и . CT-RSA, том 3376 из Lecture Notes in Computer Science, стр. 323-333. Springer, (2005)Genetic Algorithm-Based Electromagnetic Fault Injection., , , и . FDTC, стр. 35-42. IEEE Computer Society, (2018)