Author of the publication

XTR Implementation on Reconfigurable Hardware.

, , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 386-399. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays., , , and . Proceedings of the IEEE, 94 (2): 383-394 (2006)XTR Implementation on Reconfigurable Hardware., , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 386-399. Springer, (2004)Towards Security Limits in Side-Channel Attacks., , , and . IACR Cryptology ePrint Archive, (2007)Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version., , , and . IACR Cryptology ePrint Archive, (2004)From New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical Security., , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 16-29. Springer, (2013)SoC security architecture: current practices and emerging needs.. DAC, page 144:1-144:6. ACM, (2015)Towards Security Limits in Side-Channel Attacks., , , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 30-45. Springer, (2006)Power and electromagnetic analysis: Improved model, consequences and comparisons., , and . Integration, 40 (1): 52-60 (2007)Updates on the Security of FPGAs Against Power Analysis Attacks., , , and . ARC, volume 3985 of Lecture Notes in Computer Science, page 335-346. Springer, (2006)Template Attacks in Principal Subspaces., , , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 1-14. Springer, (2006)