Author of the publication

From New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical Security.

, , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 16-29. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions., , , , and . COSADE, volume 8622 of Lecture Notes in Computer Science, page 112-128. Springer, (2014)A Survey of Recent Results in FPGA Security and Intellectual Property Protection., , , and . Secure Smart Embedded Devices, Platforms and Applications, Springer, (2014)Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint., , , , and . CHES, volume 7428 of Lecture Notes in Computer Science, page 390-407. Springer, (2012)Compact FPGA Implementations of the Five SHA-3 Finalists., , , , , and . CARDIS, volume 7079 of Lecture Notes in Computer Science, page 217-233. Springer, (2011)Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices., , , , , , , , , and 7 other author(s). CARDIS, volume 7771 of Lecture Notes in Computer Science, page 158-172. Springer, (2012)Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions., , , , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 208-225. Springer, (2012)Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results., , , and . HOST, page 7-12. IEEE Computer Society, (2013)From New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical Security., , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 16-29. Springer, (2013)FPGA Implementation of a Statistical Saturation Attack against PRESENT., , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 100-116. Springer, (2011)Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices., , , , , , , , , and 2 other author(s). AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 172-187. Springer, (2012)