From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Attacks on Masked Hardware., , и . CT-RSA, том 5473 из Lecture Notes in Computer Science, стр. 211-225. Springer, (2009)Evaluation of the Masked Logic Style MDPL on a Prototype Chip., , , и . CHES, том 4727 из Lecture Notes in Computer Science, стр. 81-94. Springer, (2007)On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems., , и . ARES, стр. 230-235. IEEE Computer Society, (2013)Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware., , и . RFIDSec, том 8262 из Lecture Notes in Computer Science, стр. 128-144. Springer, (2013)Implementation and Evaluation of an SCA-Resistant Embedded Processor., , и . CARDIS, том 7079 из Lecture Notes in Computer Science, стр. 151-165. Springer, (2011)Exploiting the Difference of Side-Channel Leakages., , , , и . COSADE, том 7275 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2012)SCA-resistant embedded processors: the next generation., , и . ACSAC, стр. 211-220. ACM, (2010)Algebraic Side-Channel Analysis in the Presence of Errors., , , и . CHES, том 6225 из Lecture Notes in Computer Science, стр. 428-442. Springer, (2010)Side-Channel Leakage across Borders., , , , , и . CARDIS, том 6035 из Lecture Notes in Computer Science, стр. 36-48. Springer, (2010)Evaluation of a DPA-Resistant Prototype Chip., и . ACSAC, стр. 43-50. IEEE Computer Society, (2009)