Marcin Wójcik
According to our database1,
Marcin Wójcik
authored at least 23 papers
between 2010 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
0
1
2
3
4
5
6
1
1
2
1
2
4
1
1
3
1
1
1
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
An investigation of the aerodynamic parameters for Solar Plane wing profile using CFD modelling.
Comput. Sci., 2021
2019
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net.
J. Reliab. Intell. Environ., 2019
2018
The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018
2017
Extending programs with debug-related features, with application to hardware development.
CoRR, 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
2016
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016
2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014
2013
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices.
IACR Cryptol. ePrint Arch., 2013
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
J. Cryptogr. Eng., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the Trusted Systems - Third International Conference, 2011
2010
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture.
IACR Cryptol. ePrint Arch., 2010
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software.
Proceedings of the Trusted Systems - Second International Conference, 2010