Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems., , , and . ICASSP (3), page 904-907. IEEE, (2006)Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems., , , and . Computers & Electrical Engineering, 33 (5-6): 367-382 (2007)Signal Processing for Cryptography and Security Applications., , , , , , , and . Handbook of Signal Processing Systems, Springer, (2010)Case Study : A class E power amplifier for ISO-14443A., , , , and . DDECS, page 20-23. IEEE Computer Society, (2009)Machine learning in side-channel analysis: a first study., , , , and . J. Cryptographic Engineering, 1 (4): 293-302 (2011)Identifying and Eliminating Side-Channel Leaks in Programmable Systems., , and . IEEE Design & Test, 35 (1): 74-89 (2018)Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA., , , and . CHES, volume 8086 of Lecture Notes in Computer Science, page 435-452. Springer, (2013)Protecting RISC-V against Side-Channel Attacks., , and . DAC, page 45. ACM, (2019)SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip., , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 620-640. Springer, (2015)State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures., , , , , and . HOST, page 76-87. IEEE Computer Society, (2010)