Author of the publication

Localized Electromagnetic Analysis of Cryptographic Implementations.

, , , , and . CT-RSA, volume 7178 of Lecture Notes in Computer Science, page 231-244. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Localized electromagnetic analysis of RO PUFs., , , , , and . HOST, page 19-24. IEEE Computer Society, (2013)A Cache Timing Attack on AES in Virtualization Environments., , and . Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, page 314-328. Springer, (2012)FPGA Implementation of an Improved Attack against the DECT Standard Cipher., , , and . ICISC, volume 6829 of Lecture Notes in Computer Science, page 177-188. Springer, (2010)Localized Electromagnetic Analysis of Cryptographic Implementations., , , , and . CT-RSA, volume 7178 of Lecture Notes in Computer Science, page 231-244. Springer, (2012)Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis., , , , and . CARDIS, volume 7771 of Lecture Notes in Computer Science, page 248-262. Springer, (2012)