Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures., , , and . Microprocess. Microsystems, (2019)Decentralized, Secure and Cognitive Architecture for Automotive CyberPhysical System of Systems., , , and . MECO, page 1-5. IEEE, (2020)Distributed Threshold Cryptography Certification with No Trusted Dealer.. SECRYPT, page 400-404. SciTePress, (2011)A novel systolic GF(2k) field Multiplication-Inversion arithmetic unit., and . ICECS, page 1-4. IEEE, (2005)Performance Evaluation of Post-Quantum TLS 1.3 on Embedded Systems., , , , , and . IACR Cryptol. ePrint Arch., (2021)VLSI architecture and FPGA implementation of ICE encryption algorithm., , and . ICECS, page 88-91. IEEE, (2003)Studying OpenCL-based Number Theoretic Transform for heterogeneous platforms., , , , , and . DSD, page 339-346. IEEE, (2021)CCSW '23: Cloud Computing Security Workshop., and . CCS, page 3657-3658. ACM, (2023)Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices., , , and . Sensors, 20 (11): 3092 (2020)Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems., , , , , and . ISPEC, volume 13620 of Lecture Notes in Computer Science, page 432-451. Springer, (2022)