Search for persons
X
?
Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science ,
1
ASCA vs. SASCA: A Closer Look at the AES Key Schedule:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
2
Breaking Black Box Crypto-Devices Using Laser Fault Injecti..:
, In:
?
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
7
Secure and user-friendly over-the-air firmware distribution..:
, In:
?
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks ,
8
EyeSec: A Retrofittable Augmented Reality Tool for Troubles..:
, In:
?
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop ,
9
SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstr..:
, In:
?
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems ,
13
A Cautionary Note : Side-Channel Leakage Implications of..:
, In:
?
2016 Euromicro Conference on Digital System Design (DSD) ,
14
X25519 Hardware Implementation for Low-Latency Applications:
, In:
?
Proceedings of the 26th edition on Great Lakes Symposium on VLSI ,
15