Author of the publication

Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques.

, , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (12): 2734-2744 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Secrecy Amplification Protocols., , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 3-19. Springer, (2015)A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components., , , , , and . CCS, page 1583-1600. ACM, (2017)I Want to Break Square-free: The 4p - 1 Factorization Method and Its RSA Backdoor Viability., , , , and . ICETE (2), page 25-36. SciTePress, (2019)Evolutionary Design of Attack Strategies.. Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 18-23. Springer, (2009)The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli., , , , and . CCS, page 1631-1648. ACM, (2017)BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256., , , and . ICETE (Selected Papers), volume 990 of Communications in Computer and Information Science, page 123-149. Springer, (2017)Secure Cloud Storage System for Digital Evidence., , , , , , and . ICUMT, page 134-139. IEEE, (2023)pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (4): 355-381 (2024)Two Improvements of Random Key Predistribution for Wireless Sensor Networks., , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 61-75. Springer, (2012)On the Origin of Yet another Channel (Transcript of Discussion).. Security Protocols Workshop, volume 8263 of Lecture Notes in Computer Science, page 238-244. Springer, (2013)