Author of the publication

A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks.

, , , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Urban Trunk Road Traffic Signal Coordinated Control Based on Multi-Objective Immune Algorithm., , and . CAR, page 72-76. IEEE Computer Society, (2009)Collision-safe wavelength assignment scheme for lightpath establishment in WSONs., , , and . CCIS, page 250-253. IEEE, (2011)Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points., , , and . IEEE Trans. Dependable Sec. Comput., 16 (5): 843-855 (2019)Computational geometry-based scale space for edge-preserving multiscale image decomposition., , , and . J. Electronic Imaging, 22 (1): 013027 (2013)Power Analysis Attack of an AES GPU Implementation., , , , , , and . J. Hardware and Systems Security, 2 (1): 69-82 (2018)Differential Fault Analysis of SHA3-224 and SHA3-256., , , and . FDTC, page 4-15. IEEE Computer Society, (2016)Fine-grained news recommendation by fusing matrix factorization, topic analysis and knowledge graph representation., , , and . SMC, page 918-923. IEEE, (2017)Predicting the number of driving service orders in fine-grained regions by an ensemble multi-view-based model., , , , , and . SMC, page 936-941. IEEE, (2017)Concurrent Error Detection for Reliable SHA-3 Design., , and . ACM Great Lakes Symposium on VLSI, page 39-44. ACM, (2016)Solving the M2M Recommendation Problem via Group Multi-Role Assignment., , , , and . CSCWD, page 606-611. IEEE, (2018)