Side channel and invasive attacks on a secure code execution computer architecture
Visual cryptography using FPGA for authentication in online transactions
Addressing human factors in the design of cryptographic solutions: a two-case stud...
Efficient post-quantum cryptography for building advanced security applications