Author of the publication

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.

, , , , , and . FDTC, page 41-51. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptography Efficient Permutation Instructions for Fast Software., , and . IEEE Micro, 21 (6): 56-69 (2001)On Permutation Operations in Cipher Design., , , , and . ITCC (2), page 569-577. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.SDRT: A reliable data transport protocol for underwater sensor networks., , , , and . Ad Hoc Networks, 8 (7): 708-722 (2010)Subword Sorting with Versatile Permutation Instructions., and . ICCD, page 234-241. IEEE Computer Society, (2002)Arbitrary Bit Permutations in One or Two Cycles., , and . ASAP, page 237-. IEEE Computer Society, (2003)Distributed Algorithms for Energy-Efficient Even Self-Deployment in Mobile Sensor Networks., , , , and . IEEE Trans. Mob. Comput., 13 (5): 1035-1047 (2014)Algebraic Differential Fault Attacks on LED using a Single Fault Injection., , , , , and . IACR Cryptology ePrint Archive, (2012)Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks., , , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 305-314. Springer, (2009)RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements., , , and . IEEE Communications Magazine, 54 (2): 32-38 (2016)Accelerating higher-order masking of AES using composite field and SIMD., , , and . ISSPIT, page 575-580. IEEE, (2015)