Personensuche
X
?
Smart Card Research and Advanced Applications; Lecture Notes in Computer Science ,
1
Bernoulli at the Root of Horizontal Side Channel Attacks:
, In:
?
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing ,
5
The EVIL Machine: Encode, Visualize and Interpret the Leaka..:
, In:
?
2021 13th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo) ,
6
EM emission modeling for secure IC design:
, In:
?
Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science ,
9
Protecting Secure ICs Against Side-Channel Attacks by Ident..:
, In:
?
Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security ,
10
Spatial Dependency Analysis to Extract Information from Sid..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
11
Leakage Assessment Through Neural Estimation of the Mutual ..:
, In:
?
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop ,
13
Breaking Mobile Firmware Encryption through Near-Field Side..:
, In:
?
Smart Card Research and Advanced Applications; Lecture Notes in Computer Science ,
14
Electromagnetic Activity vs. Logical Activity: Near Field S..:
, In:
?
2019 12th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo) ,
15