Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handling the NDEF signature record type in a secure manner., and . RFID-TA, page 107-112. IEEE, (2012)SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 547-572 (2018)Side-Channel Analysis of Keymill., , , and . COSADE, volume 10348 of Lecture Notes in Computer Science, page 138-152. Springer, (2017)Clock Glitch Attacks in the Presence of Heating., , , and . FDTC, page 104-114. IEEE Computer Society, (2014)On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms., and . FDTC, page 8-17. IEEE Computer Society, (2014)Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC., , , , and . HASP@ISCA, page 1. ACM, (2013)Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android., , , and . WISEC, page 49-60. ACM, (2016)Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario., , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 17-32. Springer, (2012)Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag., and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 207-222. Springer, (2013)Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness., , , and . IEEE Trans. Information Forensics and Security, 10 (2): 266-277 (2015)