Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography., , and . IEEE Trans. Computers, 67 (11): 1594-1609 (2018)Fast Inversion in $GF(2^m)$ with Normal Basis Using Hybrid-Double Multipliers., , and . IEEE Trans. Computers, 63 (4): 1041-1047 (2014)Optimized Implementation of SIKE Round 2 on 64-bit ARM Cortex-A Processors., , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 67-I (8): 2659-2671 (2020)Error Detection Constructions for ITA Finite Field Inversions Over $GF(2^m)$ on FPGA Using CRC and Hamming Codes., , and . IEEE Trans. Reliab., 72 (2): 651-661 (2023)Cryptographic Accelerators for Digital Signature Based on Ed25519., , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (7): 1297-1305 (2021)Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography., , , , and . IEEE Trans. Emerg. Top. Comput., 11 (3): 791-797 (July 2023)Optimized SIKE Round 2 on 64-bit ARM., , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 341-353. Springer, (2019)Parallelism strategies for the tuneable golden-claw finding problem., , , , and . Int. J. Comput. Math. Comput. Syst. Theory, 6 (4): 337-363 (2021)Common Subexpression Algorithms for Space-Complexity Reduction of Gaussian Normal Basis Multiplication., , and . IEEE Trans. Inf. Theory, 61 (5): 2357-2369 (2015)A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard., , , and . CoRR, (2023)