Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Near Collision Side Channel Attacks., , and . SAC, volume 9566 of Lecture Notes in Computer Science, page 277-292. Springer, (2015)Clock Glitch Attacks in the Presence of Heating., , , and . FDTC, page 104-114. IEEE Computer Society, (2014)Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes., , , , and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 374-390. Springer, (2014)Optimality and beyond: The case of 4×4 S-boxes., , , , and . HOST, page 80-83. IEEE Computer Society, (2014)Practical Improvements to Statistical Ineffective Fault Attacks., , , and . COSADE, volume 14595 of Lecture Notes in Computer Science, page 59-75. Springer, (2024)Improving DPA resistance of S-boxes: How far can we go?, , , and . ISCAS, page 2013-2016. IEEE, (2015)On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box., , , , , and . CS2@HiPEAC, page 13-18. ACM, (2014)Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level., , , and . HOST, page 188-196. IEEE, (2020)Challenges in designing trustworthy cryptographic co-processors., , , , , , , , , and 2 other author(s). ISCAS, page 2009-2012. IEEE, (2015)Evaluation of Randomness Test Results for Short Sequences., , , and . SETA, volume 6338 of Lecture Notes in Computer Science, page 309-319. Springer, (2010)