From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cache-Timing Attack Detection and Prevention - Application to Crypto Libs and PQC., , , , , и . COSADE, том 11421 из Lecture Notes in Computer Science, стр. 13-21. Springer, (2019)OpenSSL Bellcore's Protection Helps Fault Attack., , , и . DSD, стр. 500-507. IEEE Computer Society, (2018)Cache-Timing Attacks Still Threaten IoT Devices., , , , , , и . C2SI, том 11445 из Lecture Notes in Computer Science, стр. 13-30. Springer, (2019)Speed-up of SCA Attacks on 32-bit Multiplications., , , , и . C2SI, том 11445 из Lecture Notes in Computer Science, стр. 31-39. Springer, (2019)On the Performance and Security of Multiplication in GF(2N)., , , , , , , , и . Cryptogr., 2 (3): 25 (2018)End-to-end automated cache-timing attack driven by Machine Learning., , , , и . PROOFS, том 11 из Kalpa Publications in Computing, стр. 1-16. EasyChair, (2019)Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device., , , , , и . ICISSP (Revised Selected Papers), том 1221 из Communications in Computer and Information Science, стр. 74-92. Springer, (2019)Feasibility study of a camera-based PUF in a realistic scenario., , , , , и . ARES, стр. 31:1-31:6. ACM, (2020)Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level., , и . C2SI, том 11445 из Lecture Notes in Computer Science, стр. 3-12. Springer, (2019)Binary Data Analysis for Source Code Leakage Assessment., , , , и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 391-409. Springer, (2018)