Efficiency and security of pre and post quantum cryptographic methods: theory and ...
Implementation on hardware and systems embedded of lightweight cryptographic algor...
Side channel and invasive attacks on a secure code execution computer architecture