Author of the publication

An Improvement of the Guajardo-Paar Method for Multiplication on Non-Supersingular Elliptic Curves.

, and . SCCC, page 91-95. IEEE Computer Society, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation., and . Appl. Algebra Eng. Commun. Comput., 24 (3-4): 277-308 (2013)SecLEACH - On the security of clustered sensor networks., , , , , , and . Signal Process., 87 (12): 2882-2895 (2007)FORTUNA - A framework for the design and development of hardware-based secure systems., , and . J. Syst. Softw., 86 (8): 2063-2076 (2013)A custom instruction approach for hardware and software implementations of finite field arithmetic over F263 using Gaussian normal bases., , , and . FPT, page 5-12. IEEE, (2005)ACBuilder: A tool for hardware architecture security evaluation., , , , and . HOST, page 97-102. IEEE Computer Society, (2016)Assurance Cases as a Didactic Tool for Information Security., and . World Conference on Information Security Education, volume 453 of IFIP Advances in Information and Communication Technology, page 15-26. Springer, (2015)Mining Cryptography Misuse in Online Forums., and . QRS Companion, page 143-150. IEEE, (2016)On Device Identity Establishment and Verification., , and . EuroPKI, volume 6391 of Lecture Notes in Computer Science, page 130-145. Springer, (2009)TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks., , , , , , and . Comput. Commun., 34 (3): 485-493 (2011)An Attack on a Protocol for Certified Delivery., and . ISC, volume 2433 of Lecture Notes in Computer Science, page 428-436. Springer, (2002)