Author of the publication

Interface Design for Mapping a Variety of RSA Exponentiation Algorithms on a HW/SW Co-design Platform.

, , , and . ASAP, page 109-116. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical comparison of side channel analysis distinguishers on DES in hardware., , , and . ECCTD, page 391-394. IEEE, (2009)Applications of Multivariate Quadratic Public Key Systems., and . Sicherheit, volume P-62 of LNI, page 413-424. GI, (2005)The Belgian Electronic Identity Card (Overview)., , and . Sicherheit, volume P-77 of LNI, page 298-301. GI, (2006)On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols., , , and . SACMAT, page 113-122. ACM, (2019)It's Not My Fault - On Fault Attacks on Symmetric Cryptography.. FDTC, page 57-60. IEEE Computer Society, (2012)Software Security: Squaring the Circle?. SPRO@ICSE, page 1. IEEE Computer Society, (2015)High Assurance Smart Metering., , and . HASE, page 294-297. IEEE Computer Society, (2016)Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning., , , , , and . WISEC, page 58-63. ACM, (2017)The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks., and . ICDCS Workshops, page 916-922. IEEE Computer Society, (2005)AEGIS: A Fast Authenticated Encryption Algorithm., and . Selected Areas in Cryptography, volume 8282 of Lecture Notes in Computer Science, page 185-201. Springer, (2013)