Author of the publication

Reliable Hardware Architectures of the CORDIC Algorithm With a Fixed Angle of Rotations.

, , and . IEEE Trans. Circuits Syst. II Express Briefs, 64-II (8): 972-976 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable and Error Detection Architectures of Pomaranch for False-Alarm-Sensitive Cryptographic Applications., , and . IEEE Trans. Very Large Scale Integr. Syst., 23 (12): 2804-2812 (2015)A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography., , and . IEEE Trans. Computers, 67 (11): 1594-1609 (2018)A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard., and . FDTC, page 47-53. IEEE Computer Society, (2007)Cryptographic Accelerators for Digital Signature Based on Ed25519., , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (7): 1297-1305 (2021)Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography., , , , and . IEEE Trans. Emerg. Top. Comput., 11 (3): 791-797 (July 2023)Error Detection Constructions for ITA Finite Field Inversions Over $GF(2^m)$ on FPGA Using CRC and Hamming Codes., , and . IEEE Trans. Reliab., 72 (2): 651-661 (2023)A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard., , , and . CoRR, (2023)Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4., , , and . IACR Cryptol. ePrint Arch., (2023)SIKE'd Up: Fast Hardware Architectures for Supersingular Isogeny Key Encapsulation., , , , and . IEEE Trans. Circuits Syst., 67-I (12): 4842-4854 (2020)Optimized Algorithms and Architectures for Montgomery Multiplication for Post-quantum Cryptography., , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 83-98. Springer, (2019)