Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cellular automata based key agreement., and . ICETE, page 262-267. INSTICC Press, (2005)Accelerating OpenSSL's ECC with low cost reconfigurable hardware., , , and . ISIC, page 1-4. IEEE, (2016)Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions., , , and . IACR Cryptology ePrint Archive, (2014)Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs., and . IACR Cryptology ePrint Archive, (2017)Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants., , , and . IACR Cryptology ePrint Archive, (2016)Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation., and . IEEE Trans. Computers, 64 (3): 778-790 (2015)Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules., , , , , and . IACR Cryptology ePrint Archive, (2018)Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance., , and . IACR Cryptology ePrint Archive, (2015)TweLEX: A Tweaked Version of the LEX Stream Cipher., , , and . IACR Cryptology ePrint Archive, (2011)Key Mixing in Block Ciphers through Addition modulo 2n., and . IACR Cryptology ePrint Archive, (2005)