Author of the publication

Extraction of intrinsic structure for Hardware Trojan detection.

, , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Template Attacks against ECC: practical implementation against Curve25519., , and . HOST, page 13-22. IEEE, (2020)Towards Fine-grained Side-Channel Instruction Disassembly on a System-on-Chip., , , and . DSD, page 472-479. IEEE, (2022)Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection., , and . ReConFig, page 1-6. IEEE, (2015)Granularity and detection capability of an adaptive embedded Hardware Trojan detection system., , and . HOST, page 135-138. IEEE Computer Society, (2016)The EVIL Machine: Encode, Visualize and Interpret the Leakage., , and . SAC, page 1566-1575. ACM, (2023)Leakage Assessment Through Neural Estimation of the Mutual Information., , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 144-162. Springer, (2020)A Bit-Level Approach to Side Channel Based Disassembling., , and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 143-158. Springer, (2019)Extraction of intrinsic structure for Hardware Trojan detection., , and . IACR Cryptology ePrint Archive, (2015)Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA., , , , , , , and . IACR Cryptol. ePrint Arch., (2024)On-chip fingerprinting of IC topology for integrity verification., , and . DATE, page 133-138. IEEE, (2016)