Jake Longo
Jake Longo
Verified email at bristol.ac.uk - Homepage
Cited by
Cited by
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J Longo, E De Mulder, D Page, M Tunstall
International Workshop on Cryptographic Hardware and Embedded Systems, 620-640, 2015
Simulatable leakage: Analysis, pitfalls, and new constructions
J Longo, DP Martin, E Oswald, D Page, M Stam, MJ Tunstall
International Conference on the Theory and Application of Cryptology and …, 2014
How low can you go? Using side-channel data to enhance brute-force key recovery.
J Longo, DP Martin, L Mather, E Oswald, B Sach, M Stam
IACR Cryptol. ePrint Arch. 2016, 609, 2016
The system can't perform the operation now. Try again later.
Articles 1–3