Author of the publication

A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks.

, , , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved Bayesian NMF-based speech enhancement method using multivariate Laplace distribution., , , and . WCSP, page 1-6. IEEE, (2014)An Improved Self-organization Antibody Network for Pattern Recognition and Its Performance Study., , , , and . CCPR, volume 321 of Communications in Computer and Information Science, page 96-103. Springer, (2012)On the coderivative of the solution mapping to a second-order cone constrained parametric variational inequality., , and . J. Global Optimization, 61 (2): 379-396 (2015)An hyperreality imagination based reasoning and evaluation system (HIRES)., , , and . ICRA, page 5705-5711. IEEE, (2014)Multiview triangulation with uncertain data., , , , , and . ROBIO, page 1414-1419. IEEE, (2013)Blind Multiuser Detection Based on Tikhonov Regularization., , and . IEEE Communications Letters, 15 (5): 482-484 (2011)A sample average approximation regularization method for a stochastic mathematical program with general vertical complementarity constraints., , and . J. Computational Applied Mathematics, (2015)Research on Web Information Filtering Based on Incremental Feedback Algorithm., , and . FSKD (3), page 490-494. IEEE Computer Society, (2009)Discrimination of person names based on contexts co-occurrence., , and . FSKD, page 2605-2609. IEEE, (2011)Integration of sorting system for contaminant removal from wool using a second computer., , , and . Computers in Industry, 56 (8-9): 843-853 (2005)