Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handling the NDEF signature record type in a secure manner., and . RFID-TA, page 107-112. IEEE, (2012)Side-Channel Analysis of Keymill., , , and . COSADE, volume 10348 of Lecture Notes in Computer Science, page 138-152. Springer, (2017)SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 547-572 (2018)Clock Glitch Attacks in the Presence of Heating., , , and . FDTC, page 104-114. IEEE Computer Society, (2014)On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms., and . FDTC, page 8-17. IEEE Computer Society, (2014)Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario., , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 17-32. Springer, (2012)Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag., and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 207-222. Springer, (2013)Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC., , , , and . HASP@ISCA, page 1. ACM, (2013)Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android., , , and . WISEC, page 49-60. ACM, (2016)Practical Fault Attacks on Authenticated Encryption Modes for AES., , , , and . IACR Cryptology ePrint Archive, (2016)