Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the Application of Homomorphic Encryption to a Cross Domain Solution., , , , , and . MILCOM, page 1-6. IEEE, (2019)Customizable sponge-based authenticated encryption using 16-bit S-boxes., , , , and . MILCOM, page 43-48. IEEE, (2015)Minimizing performance overhead in memory encryption., , and . J. Cryptogr. Eng., 3 (2): 129-138 (2013)Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm., , , , and . MILCOM, page 1-5. IEEE, (2018)Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm., , , , and . MIXDES, page 154-159. IEEE, (2023)Solving the Cross Domain Problem with Functional Encryption., , , , and . MILCOM, page 49-54. IEEE, (2021)Array-Based Statistical Analysis of the MK-3 Authenticated Encryption Scheme., , , , and . MILCOM, page 1-9. IEEE, (2018)Implementing authenticated encryption algorithm MK-3 on FPGA., , , , , and . MILCOM, page 1225-1230. IEEE, (2016)Statistical Analysis of the MK-3 Customizable Authenticated Encryption., , , , and . MILCOM, page 974-979. IEEE, (2022)Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher., , , , and . MIXDES, page 104-109. IEEE, (2021)