From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CMOS Based Gates for Blurring Power Information., , , и . IEEE Trans. Circuits Syst. I Regul. Pap., 63-I (7): 1033-1042 (2016)An In-Depth Evaluation of Externally Amplified Coupling (EAC) Attacks - A Concrete Threat for Masked Cryptographic Implementations., , , , и . IEEE Trans. Circuits Syst. I Regul. Pap., 70 (2): 783-796 (февраля 2023)Garbled Circuits from an SCA Perspective Free XOR can be Quite Expensive. . ., и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (2): 54-79 (2023)Revealing the Secrets of Radio-Enabled Embedded Systems: on extraction of raw information from any on-board signal through RF., , , и . IACR Cryptol. ePrint Arch., (2023)Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA., , , , , , , , , и 3 other автор(ы). DATE, стр. 508-513. IEEE, (2020)Embedded randomness and data dependencies design paradigm: Advantages and challenges., , , и . DATE, стр. 395-400. IEEE, (2018)A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs., , , , и . Integr., (2019)How Bad Are Bad Templates? Optimistic Design-Stage Side-Channel Security Evaluation and its Cost., и . Cryptogr., 4 (4): 36 (2020)Leakage Power Attack-Resilient Symmetrical 8T SRAM Cell., , , , , и . IEEE Trans. Very Large Scale Integr. Syst., 26 (10): 2180-2184 (2018)Modular Processor Architecture with Cryptography ISA Extensions., и . NEWCAS, стр. 1-2. IEEE, (2023)