Author of the publication

Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-Bit Microcontrollers.

, , , and . CARDIS, volume 14530 of Lecture Notes in Computer Science, page 256-276. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploration of System-on-Chip Secure-Boot Vulnerability to Fault-Injection by Side-Channel Analysis., , , and . DFT, page 1-6. IEEE, (2023)Electromagnetic Fault Injection as a New Forensic Approach for SoCs., , , , and . WIFS, page 1-6. IEEE, (2020)Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing., , , , and . CARDIS, volume 13820 of Lecture Notes in Computer Science, page 25-44. Springer, (2022)Evaluation of Parameter-Based Attacks Against Embedded Neural Networks with Laser Injection., , , , and . SAFECOMP, volume 14181 of Lecture Notes in Computer Science, page 259-272. Springer, (2023)Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack., , , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 255-276. Springer, (2021)Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-Bit Microcontrollers., , , and . CARDIS, volume 14530 of Lecture Notes in Computer Science, page 256-276. Springer, (2023)Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design., , , , , , , and . DFT, page 1-6. IEEE, (2021)A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters., , , and . CARDIS, volume 13820 of Lecture Notes in Computer Science, page 45-65. Springer, (2022)An Elliptic Curve Crypto-Processor Secured by Randomized Windows., , and . DSD, page 535-542. IEEE Computer Society, (2014)Randomized windows for secure scalar multiplication on elliptic curves., and . ASAP, page 78-79. IEEE Computer Society, (2014)