Author of the publication

Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing.

, , , and . SpaceSec, The Internet Society, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On measurable side-channel leaks inside ASIC design primitives., , , , and . J. Cryptogr. Eng., 4 (1): 59-73 (2014)Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (1): 264-274 (2014)SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (2): 192-217 (2018)An Abstraction Model for 1-bit Probing Attack on Block Ciphers., , , and . ICCCS, page 502-506. IEEE, (2019)Differential power analysis of AES ASIC implementations with various S-box circuits., , , and . ECCTD, page 395-398. IEEE, (2009)High-performance ASIC implementations of the 128-bit block cipher CLEFIA., , , and . ISCAS, page 2925-2928. IEEE, (2008)The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation., , and . EUROCRYPT (1), volume 14651 of Lecture Notes in Computer Science, page 97-127. Springer, (2024)Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules., , , , , , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 66-78. Springer, (2009)AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management., , , , , , , and . CoRR, (2024)Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks., , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 181-197. Springer, (2020)