Author of the publication

PRNGs for Masking Applications and Their Mapping to Evolvable Hardware.

, , , , , , and . CARDIS, volume 10146 of Lecture Notes in Computer Science, page 209-227. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring active manipulation attacks on the TERO random number generator., , , , and . MWSCAS, page 1-4. IEEE, (2016)Lightweight Prediction-Based Tests for On-Line Min-Entropy Estimation., , , and . IEEE Embed. Syst. Lett., 9 (2): 45-48 (2017)Machine Learning-based EEG Applications and Markets., , and . CoRR, (2022)A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium., , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 270-295 (2022)Securing Wireless Neurostimulators., , , , , , and . CODASPY, page 287-298. ACM, (2018)The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators., , , , , , , , , and . FDTC, page 43-48. IEEE Computer Society, (2018)Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware., , , , , , and . AFRICACRYPT, volume 9646 of Lecture Notes in Computer Science, page 147-166. Springer, (2016)A SHA-512 Hardware Implementation Based on Block RAM Storage Structure., , , , , , and . IPDPS Workshops, page 132-135. IEEE, (2022)On the Construction of Hardware-Friendly 44 and 55 S-Boxes., , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 161-179. Springer, (2016)A Search Strategy to Optimize the Affine Variant Properties of S-Boxes., , and . WAIFI, volume 10064 of Lecture Notes in Computer Science, page 208-223. (2016)