Author of the publication

Efficient collision attacks on smart card implementations of masked AES.

, , , , , , and . Sci. China Inf. Sci., 58 (5): 1-15 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient HMAC processor based on the SHA-3 HASH function., , and . ASICON, page 252-255. IEEE, (2017)A Battery-less Tire Pressure Monitoring System., , , , and . ICCVE, page 222-225. IEEE Computer Society, (2012)Double Sieve Collision Attack Based on Bitwise Detection., , and . KSII Trans. Internet Inf. Syst., 9 (1): 296-308 (2015)A Novel Detection Algorithm for Ring Oscillator Network Based Hardware Trojan Detection with Tactful FPGA Implementation., , and . CIS, page 299-302. IEEE Computer Society, (2015)Design and Implementation of an Electromagnetic Analysis System for Smart Cards., , , and . CIS, page 653-656. IEEE Computer Society, (2011)Dual-Rail Precharge Logic-Based Side-Channel Countermeasure for DNN Systolic Array., , , and . IEEE Trans. Very Large Scale Integr. Syst., 32 (9): 1740-1743 (September 2024)A passive UHF tag for RFID-based train axle temperature measurement system., , , , , , and . CICC, page 1-4. IEEE, (2011)Efficient collision attacks on smart card implementations of masked AES., , , , , , and . Sci. China Inf. Sci., 58 (5): 1-15 (2015)Hardware Implementation Based on Contact IC Card Scalar Multiplication., , , , and . CSPS, volume 571 of Lecture Notes in Electrical Engineering, page 1344-1352. Springer, (2019)Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method., , , and . BigDataSE, page 96-103. IEEE, (2020)