From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Attacks on Masked Hardware., , и . CT-RSA, том 5473 из Lecture Notes in Computer Science, стр. 211-225. Springer, (2009)An introduction to implementation attacks and countermeasures.. MEMOCODE, стр. 108-115. IEEE, (2009)Evaluation of the Masked Logic Style MDPL on a Prototype Chip., , , и . CHES, том 4727 из Lecture Notes in Computer Science, стр. 81-94. Springer, (2007)Side channel analysis resistant design flow., , , , , , , и . ISCAS, IEEE, (2006)Kapazitätsorientierte dynamische Losgrößen- und Ablaufplanung bei Sortenproduktion. Kovaÿéc, Hamburg, (1993)Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints., и . CHES, том 3659 из Lecture Notes in Computer Science, стр. 172-186. Springer, (2005)Algebraic Side-Channel Analysis in the Presence of Errors., , , и . CHES, том 6225 из Lecture Notes in Computer Science, стр. 428-442. Springer, (2010)Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box., , , и . J. Signal Process. Syst., 50 (2): 251-261 (2008)Evaluation of a DPA-Resistant Prototype Chip., и . ACSAC, стр. 43-50. IEEE Computer Society, (2009)Potential and Challenges of Harmonizing 40 Years of AVHRR Data: The TIMELINE Experience., , , , , , , , , и 19 other автор(ы). Remote. Sens., 13 (18): 3618 (2021)