Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optical Fault Attacks on AES: A Threat in Violet., , and . FDTC, page 13-22. IEEE Computer Society, (2009)Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps., , and . ARES, page 169-177. IEEE Computer Society, (2013)EM Leakage of RFID Devices - Comparison of Two Measurement Approaches., and . ARES, page 120-125. IEEE Computer Society, (2014)On the Applicability of Time-Driven Cache Attacks on Mobile Devices., and . NSS, volume 7873 of Lecture Notes in Computer Science, page 656-662. Springer, (2013)Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices., , , , , , , , , and 2 other author(s). AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 172-187. Springer, (2012)On the security of RFID devices against implementation attacks., , and . IJSN, 5 (2/3): 106-118 (2010)Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag., and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 426-435. Springer, (2011)Cache-Access Pattern Attack on Disaligned AES T-Tables., and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 200-214. Springer, (2013)Exploiting the Difference of Side-Channel Leakages., , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 1-16. Springer, (2012)Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario., , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 17-32. Springer, (2012)