From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introduction to the Special Issue on Emerging Challenges and Solutions in Hardware Security., , , , и . ACM J. Emerg. Technol. Comput. Syst., 17 (3): 29:1-29:4 (2021)Cache Timing Attacks on Clefia., , , и . INDOCRYPT, том 5922 из Lecture Notes in Computer Science, стр. 104-118. Springer, (2009)An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines., , , и . INDOCRYPT, том 7107 из Lecture Notes in Computer Science, стр. 58-75. Springer, (2011)Design of a Differential Power Analysis Resistant Masked AES S-Box., , и . INDOCRYPT, том 4859 из Lecture Notes in Computer Science, стр. 373-383. Springer, (2007)POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS., , , и . AsiaCCS, стр. 849-851. ACM, (2018)Birds of the Same Feather Flock Together: A Dual-Mode Circuit Candidate for Strong PUF-TRNG Functionalities., , , , и . IEEE Trans. Computers, 72 (6): 1636-1651 (июня 2023)vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks., , , и . IACR Cryptol. ePrint Arch., (2023)Physically Related Functions: A New Paradigm for Light-weight Key-Exchange., , , , , и . IACR Cryptol. ePrint Arch., (2021)Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms., и . CHES, том 9293 из Lecture Notes in Computer Science, стр. 248-266. Springer, (2015)A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and Its Application to RS-Coded MPSK Modulation., , и . ACRI, том 4173 из Lecture Notes in Computer Science, стр. 204-214. Springer, (2006)