Search for persons
X
?
Topics in Cryptology – CT-RSA 2021; Lecture Notes in Computer Science ,
1
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study:
, In:
?
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security ,
3
SoK : On DFA Vulnerabilities of Substitution-Permutation..:
, In:
?
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation ,
5
Session details: Security threats caused by novel technolog..:
, In:
?
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation ,
6
Crack me if you can: hardware acceleration bridging the gap..:
, In:
?
Proceedings of the 53rd Annual Design Automation Conference ,
11
PLL to the rescue : a novel EM fault countermeasure:
, In:
?
2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) ,
12
Linear complementary dual code improvement to strengthen en..:
, In:
?
Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy ,
14
Side-channel leakage and trace compression using normalized..:
, In:
?
Proceedings of the 9th Workshop on Embedded Systems Security ,
15