Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem., , , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 438-467. Springer, (2021)Centrality Indicators for Efficient and Scalable Logic Masking., , and . ISVLSI, page 98-103. IEEE Computer Society, (2017)Reversible Denial-of-Service by Locking Gates Insertion for IP Cores Design Protection., , and . ISVLSI, page 210-215. IEEE Computer Society, (2015)Microarchitectural Insights into Unexplained Behaviors Under Clock Glitch Fault Injection., , , , and . CARDIS, volume 14530 of Lecture Notes in Computer Science, page 3-22. Springer, (2023)Single-bit Laser Fault Model in NOR Flash Memories: Analysis and Exploitation., , , , , and . FDTC, page 41-48. IEEE, (2020)Key Reconciliation Protocols for Error Correction of Silicon PUF Responses., , , and . IACR Cryptology ePrint Archive, (2016)Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems., , , , and . IACR Cryptol. ePrint Arch., (2020)A comprehensive hardware/software infrastructure for IP cores design protection., , , and . FPT, page 263-266. IEEE, (2017)Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller., , , , , and . HOST, page 1-10. IEEE, (2019)Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions., , , , , and . J. Cryptogr. Eng., 14 (2): 325-342 (June 2024)