Author of the publication

A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies.

, , , , , , , , , , and . ICSAMOS, page 209-214. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of AES and Camellia with Related S-boxes.. AFRICACRYPT, volume 7918 of Lecture Notes in Computer Science, page 208-221. Springer, (2013)An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512)., , and . ACM Great Lakes Symposium on VLSI, page 421-425. ACM, (2004)Addendum to Ön the Generalized Linear Equivalence of Functions over Finite Fields".. IACR Cryptology ePrint Archive, (2004)Efficient AES implementations for ARM based platforms., , and . SAC, page 841-845. ACM, (2004)Evaluating physically unclonable functions on a large set of FPGAs., , , , and . SAMOS, page 188-195. IEEE, (2016)The Design of a High Speed ASIC Unit for the Hash Function SHA-256 (384, 512)., , and . DATE, page 70-75. IEEE Computer Society, (2004)Efficient Software Implementation of AES on 32-Bit Platforms., , , , and . CHES, volume 2523 of Lecture Notes in Computer Science, page 159-171. Springer, (2002)A Complete Formulation of Generalized Affine Equivalence., , , and . ICTCS, volume 3701 of Lecture Notes in Computer Science, page 338-347. Springer, (2005)On the Generalized Linear Equivalence of Functions Over Finite Fields., , and . ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 79-91. Springer, (2004)Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology., , , , , , , , , and 1 other author(s). Trans. Computational Science, (2009)