From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , и . IACR Cryptology ePrint Archive, (2017)Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level., , и . C2SI, том 11445 из Lecture Notes in Computer Science, стр. 3-12. Springer, (2019)Binary Data Analysis for Source Code Leakage Assessment., , , , и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 391-409. Springer, (2018)Development of the Unified Security Requirements of PUFs During the Standardization Process., , , , , , , и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 314-330. Springer, (2018)Experiment on Side-Channel Key-Recovery using a Real LPWA End-device., , , , , и . ICISSP, стр. 67-74. SciTePress, (2019)Combined Side-Channel Attacks., , , и . WISA, том 6513 из Lecture Notes in Computer Science, стр. 175-190. Springer, (2010)Differential Power Analysis Model and Some Results., , и . CARDIS, том 153 из IFIP, стр. 127-142. Kluwer/Springer, (2004)Multiply Constant Weight Codes, , , , и . Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, стр. 306--310. IEEE, (июля 2013)Detecting Hidden Leakages., , и . ACNS, том 8479 из Lecture Notes in Computer Science, стр. 324-342. Springer, (2014)Fault Analysis Attack on an FPGA AES Implementation., , , , и . NTMS, стр. 1-5. IEEE, (2008)