Author of the publication

A Fast Characterization Method for Semi-invasive Fault Injection Attacks.

, , , and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 146-170. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving DPA resistance of S-boxes: How far can we go?, , , and . ISCAS, page 2013-2016. IEEE, (2015)On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box., , , , , and . CS2@HiPEAC, page 13-18. ACM, (2014)On the evolution of bent (n, m) functions., , and . CEC, page 2137-2144. IEEE, (2017)Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data., , and . FUZZ-IEEE, page 1-8. IEEE, (2015)Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis., , and . COSADE, volume 12244 of Lecture Notes in Computer Science, page 175-199. Springer, (2020)Evolving Cryptographic Pseudorandom Number Generators., , , , , and . PPSN, volume 9921 of Lecture Notes in Computer Science, page 613-622. Springer, (2016)Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 809-829. Springer, (2022)Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand., , , , , and . USENIX Security Symposium, page 1687-1704. USENIX Association, (2022)The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption., , , , , , and . NDSS, The Internet Society, (2023)Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions., , , and . CoRR, (2023)