From post

Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level.

, , и . C2SI, том 11445 из Lecture Notes in Computer Science, стр. 3-12. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Differential Power Analysis Model and Some Results., , и . CARDIS, том 153 из IFIP, стр. 127-142. Kluwer/Springer, (2004)Multiply Constant Weight Codes, , , , и . Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, стр. 306--310. IEEE, (июля 2013)Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , и . IACR Cryptology ePrint Archive, (2017)Combined Side-Channel Attacks., , , и . WISA, том 6513 из Lecture Notes in Computer Science, стр. 175-190. Springer, (2010)Experiment on Side-Channel Key-Recovery using a Real LPWA End-device., , , , , и . ICISSP, стр. 67-74. SciTePress, (2019)Binary Data Analysis for Source Code Leakage Assessment., , , , и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 391-409. Springer, (2018)Development of the Unified Security Requirements of PUFs During the Standardization Process., , , , , , , и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 314-330. Springer, (2018)Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level., , и . C2SI, том 11445 из Lecture Notes in Computer Science, стр. 3-12. Springer, (2019)Feasibility study of a camera-based PUF in a realistic scenario., , , , , и . ARES, стр. 31:1-31:6. ACM, (2020)PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community., , , , , , , и . ETS, стр. 1-10. IEEE, (2020)