Author of the publication

Optimized Register Renaming Scheme for Stack-Based x86 Operations.

, , , , , , , , and . ARCS, volume 4415 of Lecture Notes in Computer Science, page 43-56. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption., , , , , and . IJES, 7 (3/4): 216-229 (2015)Software and Hardware Cooperate for 1-D FFT Algorithm Optimization on Multicore Processors., , and . CIT (1), page 86-91. IEEE Computer Society, (2009)Hilbert Transform Based Vertical Preprocessing for Side-Channel Analysis., , , and . ICCCN, page 1-7. IEEE, (2016)Template attack vs. stochastic model: An empirical study on the performances of profiling attacks in real scenarios., and . Microprocessors and Microsystems - Embedded Hardware Design, (2019)Multiple leakage samples based higher order optimal distinguisher., and . Inf. Sci., (2018)On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage., , , , and . IACR Cryptology ePrint Archive, (2019)A statistical model for DPA when algorithmic noise is dependent on target., , , , , and . Security and Communication Networks, 9 (18): 4882-4896 (2016)Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation., , , and . IACR Cryptology ePrint Archive, (2011)How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace., , , , , , and . IACR Cryptology ePrint Archive, (2017)High Performance Matrix Multiplication on Many Cores., , , , and . Euro-Par, volume 5704 of Lecture Notes in Computer Science, page 948-959. Springer, (2009)