Author of the publication

The Temperature Side Channel and Heating Fault Attacks.

, and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 219-235. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID., and . RFIDSec, volume 8651 of Lecture Notes in Computer Science, page 156-172. Springer, (2014)Exploiting the Difference of Side-Channel Leakages., , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 1-16. Springer, (2012)Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario., , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 17-32. Springer, (2012)Attacking ECDSA-Enabled RFID Devices., , , and . ACNS, volume 5536 of Lecture Notes in Computer Science, page 519-534. (2009)Clock Glitch Attacks in the Presence of Heating., , , and . FDTC, page 104-114. IEEE Computer Society, (2014)Improved Fixed-Base Comb Method for Fast Scalar Multiplication., , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 342-359. Springer, (2012)Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC., , , , and . HASP@ISCA, page 1. ACM, (2013)NaCl's Crypto_box in Hardware., , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 81-101. Springer, (2015)Constant-Time Higher-Order Boolean-to-Arithmetic Masking., and . IACR Cryptology ePrint Archive, (2016)On the security of RFID devices against implementation attacks., , and . IJSN, 5 (2/3): 106-118 (2010)