Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards AI-Enabled Hardware Security: Challenges and Opportunities., , , , , , and . IOLTS, page 1-10. IEEE, (2022)Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols., , , , and . ACM Trans. Embed. Comput. Syst., 20 (6): 110:1-110:22 (2021)Leaking secrets in homomorphic encryption with side-channel attacks., and . J. Cryptogr. Eng., 14 (2): 241-251 (June 2024)Rapid Design of Real-Time Image Fusion on FPGA using HLS and Other Techniques., , , , , , , and . AICCSA, page 1-6. IEEE Computer Society, (2018)Indoor Coverage Analysis for Unmanned Aerial Vehicle Base Stations., , , and . SIU, page 1-4. IEEE, (2019)RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library., , , , and . DATE, page 1527-1532. IEEE, (2022)Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks., and . IACR Cryptol. ePrint Arch., (2023)Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-., , , , , , , , , and 9 other author(s). ICCAD, page 141:1-141:6. IEEE, (2020)Single Platform Geolocation., , , , and . SIU, page 1-4. IEEE, (2020)DeePar-SCA: Breaking Parallel Architectures of Lattice Cryptography via Learning Based Side-Channel Attacks., , , , and . SAMOS, volume 12471 of Lecture Notes in Computer Science, page 262-280. Springer, (2020)