From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated software protection for the masses against side-channel attacks., , , и . IACR Cryptology ePrint Archive, (2018)Reconciling optimization with secure compilation., , , , и . Proc. ACM Program. Lang., 5 (OOPSLA): 1-30 (2021)Secure Optimization Through Opaque Observations., , , , и . CoRR, (2021)LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions., , и . IACR Cryptol. ePrint Arch., (2021)SKIVA: Flexible and Modular Side-channel and Fault Countermeasures., , , , и . IACR Cryptol. ePrint Arch., (2019)Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification., , и . IACR Cryptol. ePrint Arch., (2022)Using Runtime Activity to Dynamically Filter Out Inefficient Data Prefetches., , и . Euro-Par (1), том 6852 из Lecture Notes in Computer Science, стр. 338-350. Springer, (2011)Editorial about PROOFS 2019., и . J. Cryptogr. Eng., 11 (2): 103-104 (2021)Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification., , , и . CARDIS, том 9514 из Lecture Notes in Computer Science, стр. 177-192. Springer, (2015)Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks., , , , и . COSADE, том 12244 из Lecture Notes in Computer Science, стр. 221-253. Springer, (2020)