Author of the publication

Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level.

, , and . C2SI, volume 11445 of Lecture Notes in Computer Science, page 3-12. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feasibility study of a camera-based PUF in a realistic scenario., , , , , and . ARES, page 31:1-31:6. ACM, (2020)PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community., , , , , , , and . ETS, page 1-10. IEEE, (2020)Verified Value Chains, Innovation and Competition., , , , , , , , , and 3 other author(s). CSR, page 470-476. IEEE, (2023)Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings., , , , , , and . COSADE, volume 13979 of Lecture Notes in Computer Science, page 86-104. Springer, (2023)Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations., , , , , , and . ITW, page 81-86. IEEE, (2023)Bent Sequences over Hadamard Codes for Physically Unclonable Functions., , , and . ISIT, page 801-806. IEEE, (2021)Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy., , , , and . ISIT, page 654-659. IEEE, (2023)Editorial about PROOFS 2015.. J. Cryptogr. Eng., 7 (1): 19-20 (2017)Recovering Secrets From Prefix-Dependent Leakage., , , , and . J. Math. Cryptol., 14 (1): 15-24 (2020)Differential Power Analysis Model and Some Results., , and . CARDIS, volume 153 of IFIP, page 127-142. Kluwer/Springer, (2004)