Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (4): 828-861 (2022)SoK: Deep Learning-based Physical Side-channel Analysis., , , , and . ACM Comput. Surv., 55 (11): 227:1-227:35 (November 2023)Attacking Randomized Exponentiations Using Unsupervised Learning., , , and . COSADE, volume 8622 of Lecture Notes in Computer Science, page 144-160. Springer, (2014)Montgomery Modular Multiplication on Reconfigurable Hardware: Systolic versus Multiplexed Implementation., , and . Int. J. Reconfigurable Comput., (2011)The Need for MORE: Unsupervised Side-Channel Analysis with Single Network Training and Multi-output Regression., , , , and . COSADE, volume 14595 of Lecture Notes in Computer Science, page 113-132. Springer, (2024)A Semi-Parametric Approach for Side-Channel Attacks on Protected RSA Implementations., and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 34-53. Springer, (2015)A Gigabit UDP/IP network stack in FPGA., , , , and . ICECS, page 836-839. IEEE, (2009)On the Evaluation of Deep Learning-based Side-channel Analysis., , and . IACR Cryptol. ePrint Arch., (2021)Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext., , and . IACR Cryptol. ePrint Arch., (2023)Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis., , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 53-81. Springer, (2021)