From post

Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks.

, , , и . ACNS Workshops, том 12418 из Lecture Notes in Computer Science, стр. 181-197. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication., , , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (1): 264-274 (2014)On measurable side-channel leaks inside ASIC design primitives., , , , и . J. Cryptogr. Eng., 4 (1): 59-73 (2014)SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation., , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (2): 192-217 (2018)An Abstraction Model for 1-bit Probing Attack on Block Ciphers., , , и . ICCCS, стр. 502-506. IEEE, (2019)Differential power analysis of AES ASIC implementations with various S-box circuits., , , и . ECCTD, стр. 395-398. IEEE, (2009)Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules., , , , , , и . WISA, том 5932 из Lecture Notes in Computer Science, стр. 66-78. Springer, (2009)High-performance ASIC implementations of the 128-bit block cipher CLEFIA., , , и . ISCAS, стр. 2925-2928. IEEE, (2008)Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels., , , , и . MobiSec, том 2095 из Communications in Computer and Information Science, стр. 152-166. Springer, (2023)AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management., , , , , , , и . SP, стр. 331-349. IEEE, (2024)The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation., , и . EUROCRYPT (1), том 14651 из Lecture Notes in Computer Science, стр. 97-127. Springer, (2024)