Author of the publication

A Systematic Design of Tamper-Resistant Galois-Field Arithmetic Circuits Based on Threshold Implementation with (d + 1) Input Shares.

, , and . ISMVL, page 136-141. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation., , and . COSADE, volume 10348 of Lecture Notes in Computer Science, page 50-64. Springer, (2017)SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization., , , , , and . IACR Cryptol. ePrint Arch., (2022)Efficient Modular Polynomial Multiplier for NTT Accelerator of Crystals-Kyber., , and . DSD, page 528-533. IEEE, (2022)An Efficient Approach to Verifying Galois-Field Arithmetic Circuits of Higher Degrees and Its Application to ECC Decoders., , , and . ISMVL, page 144-149. IEEE Computer Society, (2014)Quaternary Debiasing for Physically Unclonable Functions., , , and . ISMVL, page 7-12. IEEE Computer Society, (2018)Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-., , , , , , , , , and 9 other author(s). ICCAD, page 141:1-141:6. IEEE, (2020)Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design., , , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 63-80. Springer, (2015)A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware., , and . ISMVL, page 154-159. IEEE, (2021)Debiasing Method for Efficient Ternary Fuzzy Extractors and Ternary Physically Unclonable Functions., , and . ISMVL, page 52-57. IEEE, (2020)Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks., , , and . IACR Cryptol. ePrint Arch., (2023)