Author of the publication

A model of the leakage in the frequency domain and its application to CPA and DPA.

, , , , and . J. Cryptographic Engineering, 4 (3): 197-212 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Adaptive Bandwidth Selection for Efficient MIA., , , , , , and . COSADE, volume 8622 of Lecture Notes in Computer Science, page 82-97. Springer, (2014)A frequency leakage model for SCA., , , , and . HOST, page 97-100. IEEE Computer Society, (2014)An EM Fault Injection Susceptibility Criterion and Its Application to the Localization of Hotspots., , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 180-195. Springer, (2017)Low-cost recovery for the code integrity protection in secure embedded processors., , , and . HOST, page 99-104. IEEE Computer Society, (2011)A model of the leakage in the frequency domain and its application to CPA and DPA., , , , and . J. Cryptographic Engineering, 4 (3): 197-212 (2014)Implementation of Complex Strategies of Security Insecure Embedded Systems., , , , , , and . NTMS, page 1-5. IEEE, (2011)How to flip a bit?, , , , , and . IOLTS, page 235-239. IEEE Computer Society, (2010)Design and characterisation of an AES chip embedding countermeasures., , , , , , and . IJIEI, 1 (3/4): 328-347 (2011)Low-cost fault tolerance on the ALU in simple pipelined processors., , , and . DDECS, page 28-31. IEEE Computer Society, (2010)A Frequency Leakage Model and its application to CPA and DPA., , , , and . IACR Cryptology ePrint Archive, (2013)