Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On MILS I/O Sharing Targeting Avionic Systems., , , and . EDCC, page 182-193. IEEE Computer Society, (2014)Protecting PUF Error Correction by Codeword Masking., , and . IACR Cryptology ePrint Archive, (2013)Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements., , , and . COSADE, volume 9064 of Lecture Notes in Computer Science, page 3-19. Springer, (2015)Aging effects on ring-oscillator-based physical unclonable functions on FPGAs., , and . ReConFig, page 1-6. IEEE, (2015)GORDIAN: VLSI placement by quadratic programming and slicing optimization., , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 10 (3): 356-365 (1991)A Petite and Power Saving Design for the AES S-Box., , and . DSD, page 661-667. IEEE Computer Society, (2015)A measurement system for capacitive PUF-based security enclosures., , , and . DAC, page 64:1-64:6. ACM, (2018)Take a moment and have some t: Hypothesis testing on raw PUF data., , , and . HOST, page 128-129. IEEE Computer Society, (2017)Breaking TrustZone Memory Isolation through Malicious Hardware on a Modern FPGA-SoC., , , and . ASHES@CCS, page 3-12. ACM, (2019)Precise Laser Fault Injections into 90 nm and 45 nm SRAM-cells., , , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 193-205. Springer, (2015)