1 – 6 of 6
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
- 2021
-
Mark
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
- 2017
-
Mark
Espresso: A stream cipher for 5G wireless communication systems
(
- Contribution to journal › Article
-
Mark
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST
(
- Contribution to journal › Article
- 2014
-
Mark
Keyed logic BIST for Trojan detection in SoC
2014) 2014 16th International Symposium on System-on-Chip, SoC 2014 In 2014 International Symposium on System-on-Chip, SoC 2014(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding