| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
HOST
|
| 2025 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2023 | A | conf |
AsiaCCS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A | conf |
AISTATS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | Misc | conf |
ICMLC
|
| 2020 | J | jnl |
IACR Trans. Cryptogr. Hardw. Embed. Syst.
|
| 2020 | — | conf |
VSTTE
|
| 2019 | J | jnl |
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points.
IEEE Trans. Dependable Secur. Comput.
|
| 2019 | J | jnl |
CoRR
|
| 2018 | J | jnl |
J. Hardw. Syst. Secur.
|
| 2018 | A | conf |
ICCAD
|
| 2017 | J | jnl |
J. Mach. Learn. Res.
|
| 2017 | C | conf |
ICCD
|
| 2017 | J | jnl |
J. Hardw. Syst. Secur.
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | A | conf |
DATE
|
| 2017 | C | conf |
CARDIS
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | A | conf |
AISTATS
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | C | conf |
FDTC
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | B | conf |
SECON
|
| 2016 | — | conf |
COSADE
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | — | conf |
ASIACRYPT (2)
|
| 2015 | J | jnl |
J. Cryptogr. Eng.
|
| 2015 | — | conf |
HOST
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | — | conf |
HASP@ISCA
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | — | conf |
ASAP
|
| 2014 | A | conf |
CHES
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | — | conf |
ReConFig
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | — | conf |
ReConFig
|
| 2012 | A | conf |
CHES
|