Author of the publication

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware.

, and . IACR Cryptology ePrint Archive, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors., and . WAIFI, volume 4547 of Lecture Notes in Computer Science, page 40-54. Springer, (2007)Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors., and . CHES, volume 4249 of Lecture Notes in Computer Science, page 270-284. Springer, (2006)Optimized RISC Architecture for Multiple-Precision Modular Arithmetic., and . SPC, volume 2802 of Lecture Notes in Computer Science, page 253-270. Springer, (2003)Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box., , and . SAMOS, volume 4017 of Lecture Notes in Computer Science, page 457-466. Springer, (2006)Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware., and . IACR Cryptology ePrint Archive, (2011)Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers., , , and . FiCloud Workshops, page 231-236. IEEE Computer Society, (2018)Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags.. Inscrypt, volume 6151 of Lecture Notes in Computer Science, page 366-382. Springer, (2009)AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers., , , and . DATE, page 1272-1277. IEEE, (2021)Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX)., , , , , , , and . CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 419-448. Springer, (2020)Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2., , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 204-224. Springer, (2020)