Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ASHES 2018- Workshop on Attacks and Solutions in Hardware Security., , , , and . ACM Conference on Computer and Communications Security, page 2168-2170. ACM, (2018)High-Level Synthesis of Benevolent Trojans., , , , and . DATE, page 1124-1129. IEEE, (2019)Security in Autonomous Systems., , , and . ETS, page 1-8. IEEE, (2019)Embedded Systems Education: Job Market Expectations., , , and . WESE, page 3:1-3:5. ACM, (2014)Exploring Energy Efficiency of Lightweight Block Ciphers., , and . SAC, volume 9566 of Lecture Notes in Computer Science, page 178-194. Springer, (2015)Physical Attacks and Beyond.. SAC, volume 10532 of Lecture Notes in Computer Science, page 3-13. Springer, (2016)An EDA-friendly protection scheme against side-channel attacks., , , , , and . DATE, page 410-415. EDA Consortium San Jose, CA, USA / ACM DL, (2013)A reconfigurable multiprocessor architecture for a reliable face recognition implementation., , , , and . DATE, page 319-322. IEEE, (2010)Compact circuits for combined AES encryption/decryption., , and . J. Cryptographic Engineering, 9 (1): 69-83 (2019)The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (1): 209-237 (2019)