Efficiency and security of pre and post quantum cryptographic methods: theory and ...
Side channel and invasive attacks on a secure code execution computer architecture
Implementation on hardware and systems embedded of lightweight cryptographic algor...