Author of the publication

Novel Precomputation Schemes for Elliptic Curve Cryptosystems.

, and . ACNS, volume 5536 of Lecture Notes in Computer Science, page 71-88. (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA., , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 250-264. Springer, (2005)Efficient Techniques for High-Speed Elliptic Curve Cryptography., and . CHES, volume 6225 of Lecture Notes in Computer Science, page 80-94. Springer, (2010)Methodology for EM Fault Injection: Charge-based Fault Model., and . DATE, page 256-259. IEEE, (2019)Counteracting power analysis attack using Static Single-ended Logic., , and . ISCAS, page 721-724. IEEE, (2011)Simultaneous Scheduling and Allocation for Cost Constrained Optimal Architectural Synthesis., and . DAC, page 2-7. ACM, (1991)Faster Explicit Formulas for Computing Pairings over Ordinary Curves., , , , and . IACR Cryptol. ePrint Arch., (2010)EM Fault Injection on ARM and RISC-V., , and . ISQED, page 206-212. IEEE, (2020)A Sliding Window Phase-Only Correlation Method for Side-Channel Alignment in a Smartphone., and . ACM Trans. Embed. Comput. Syst., 14 (4): 80:1-80:22 (2015)Design of secure cryptography against the threat of power-attacks in DSP-embedded processors.. ACM Trans. Embed. Comput. Syst., 3 (1): 92-113 (2004)Global optimization approach for architectural synthesis., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 12 (9): 1266-1278 (1993)