From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated software protection for the masses against side-channel attacks., , , и . IACR Cryptology ePrint Archive, (2018)Compilation pour l'application de contre-mesures contre les attaques par canal auxiliaire. (Automated application of countermeasures against side-channel attacks by compilation).. Grenoble Alpes University, France, (2019)Automatic Application of Software Countermeasures Against Physical Attacks., , , , , , и . Cyber-Physical Systems Security, Springer, (2018)A Tale of Resilience: On the Practical Security of Masked Software Implementations., , , и . IEEE Access, (2023)Accelerating exp-log based finite field multiplication.. IACR Cryptol. ePrint Arch., (2023)Maskara: Compilation of a Masking Countermeasure With Optimized Polynomial Interpolation., , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (11): 3774-3786 (2020)Automated Software Protection for the Masses Against Side-Channel Attacks., , , и . ACM Trans. Archit. Code Optim., 15 (4): 47:1-47:27 (2019)Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES., , , , , , и . ESORICS (1), том 12308 из Lecture Notes in Computer Science, стр. 440-460. Springer, (2020)Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security., и . COSADE, том 14595 из Lecture Notes in Computer Science, стр. 260-280. Springer, (2024)All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems., , , , , , , , и . CS2@HiPEAC, стр. 17-18. ACM, (2018)