Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DFA on AES Based on the Entropy of Error Distributions., , , , , and . FDTC, page 34-43. IEEE Computer Society, (2012)A side-channel and fault-attack resistant AES circuit working on duplicated complemented values., , , , , and . ISSCC, page 274-276. IEEE, (2011)On-chip fingerprinting of IC topology for integrity verification., , and . DATE, page 133-138. IEEE, (2016)Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software., , and . IACR Cryptology ePrint Archive, (2018)Practical Algebraic Side-Channel Attacks Against ACORN., , and . IACR Cryptology ePrint Archive, (2019)Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography., and . DSD, page 439-446. IEEE Computer Society, (2006)SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection., , , and . ECCTD, page 1-4. IEEE, (2015)Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults., , and . IACR Cryptology ePrint Archive, (2015)SWARD: A Secure WAke-up RaDio against Denial-of-Service on IoT devices., , , and . WISEC, page 190-195. ACM, (2018)Increasing the efficiency of laser fault injections using fast gate level reverse engineering., , , and . HOST, page 60-63. IEEE Computer Society, (2014)