Author of the publication

Under the Dome: Preventing Hardware Timing Information Leakage.

, , , and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 233-253. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extraction of intrinsic structure for Hardware Trojan detection., , and . IACR Cryptology ePrint Archive, (2015)Pelvic motion measurement during over ground walking, analysis and implementation on the WalkTrainer reeducation device., , , , , , , and . IROS, page 2362-2367. IEEE, (2008)Pelvic motion implementation on the WalkTrainer., , , , , and . ROBIO, page 133-138. IEEE, (2007)Correlation-based imaging of fast moving objects using a sparse network of passive receivers., , , and . ACSSC, page 1618-1622. IEEE, (2018)Under the Dome: Preventing Hardware Timing Information Leakage., , , and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 233-253. Springer, (2021)Adaptive Masking: a Dynamic Trade-off between Energy Consumption and Hardware Security., , , , and . ICCD, page 559-566. IEEE, (2019)On-chip fingerprinting of IC topology for integrity verification., , and . DATE, page 133-138. IEEE, (2016)SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection., , , and . ECCTD, page 1-4. IEEE, (2015)Template Attacks against ECC: practical implementation against Curve25519., , and . HOST, page 13-22. IEEE, (2020)Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography., and . DSD, page 439-446. IEEE Computer Society, (2006)