Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Susceptibility of UHF RFID Tags to Electromagnetic Analysis.. CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 288-300. Springer, (2008)On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices., , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 163-177. Springer, (2009)Side-Channel Leakage across Borders., , , , , and . CARDIS, volume 6035 of Lecture Notes in Computer Science, page 36-48. Springer, (2010)Semi-passive RFID development platform for implementing and attacking security tags., , , , , and . ICITST, page 1-6. IEEE, (2010)An ECDSA Processor for RFID Authentication., , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 189-202. Springer, (2010)Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 21 (11): 1965-1974 (2013)On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems., , and . ARES, page 230-235. IEEE Computer Society, (2013)On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID Tags., and . ARES, page 38-46. IEEE Computer Society, (2012)Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag., and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 207-222. Springer, (2013)Cache-Access Pattern Attack on Disaligned AES T-Tables., and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 200-214. Springer, (2013)