Author of the publication

Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?

, , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 14-27. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Attack on a FPGA based True Random Number Generator., , and . WESS, page 6. ACM, (2015)POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS., , , and . AsiaCCS, page 849-851. ACM, (2018)Physically Related Functions: A New Paradigm for Light-weight Key-Exchange., , , , , and . IACR Cryptol. ePrint Arch., (2021)vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks., , , and . IACR Cryptol. ePrint Arch., (2023)A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and Its Application to RS-Coded MPSK Modulation., , and . ACRI, volume 4173 of Lecture Notes in Computer Science, page 204-214. Springer, (2006)Cache Timing Attacks on Clefia., , , and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 104-118. Springer, (2009)An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines., , , and . INDOCRYPT, volume 7107 of Lecture Notes in Computer Science, page 58-75. Springer, (2011)Design of a Differential Power Analysis Resistant Masked AES S-Box., , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 373-383. Springer, (2007)Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms., and . CHES, volume 9293 of Lecture Notes in Computer Science, page 248-266. Springer, (2015)Group Properties of Non-linear Cellular Automata.. J. Cell. Autom., 5 (1-2): 139-155 (2010)