Author of the publication

Side-channel Timing Attack of RSA on a GPU.

, , and . ACM Trans. Archit. Code Optim., 16 (3): 32:1-32:18 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card., , , and . IACR Cryptology ePrint Archive, (2016)Leveraging speculative architectures for runtime program validation., and . ACM Trans. Embed. Comput. Syst., 13 (1): 3:1-3:18 (2013)Guest Editorial: Special Section on Embedded System Security., , and . IEEE Embed. Syst. Lett., 7 (1): 1-2 (2015)DAP-MAC: A delay-aware probability-based MAC protocol for underwater acoustic sensor networks., and . Ad Hoc Networks, (2016)Side-channel Timing Attack of RSA on a GPU., , and . ACM Trans. Archit. Code Optim., 16 (3): 32:1-32:18 (2019)A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis., , and . IEEE Trans. Inf. Forensics Secur., (2023)PIFT: efficient dynamic information flow tracking using secure page allocation., , and . WESS, ACM, (2009)MURAO: A multi-level routing protocol for acoustic-optical hybrid underwater wireless sensor networks., and . SECON, page 218-226. IEEE, (2012)Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs)., , , , and . HASP@ISCA, page 10:1-10:8. ACM, (2014)Intrinsic Examples: Robust Fingerprinting of Deep Neural Networks., , , , , , , and . BMVC, page 46. BMVA Press, (2021)