Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Dynamic Memory Integration in Co-Simulation Frameworks for Multiprocessor System on-Chip, , , , and . CoRR, (2007)Ultra Low-Power implementation of ECC on the ARM Cortex-M0+., , , and . DAC, page 112:1-112:6. ACM, (2014)Low-cost untraceable authentication protocols for RFID., , , and . WISEC, page 55-64. ACM, (2010)ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 267-292 (2018)An embedded platform for privacy-friendly road charging applications., , and . DATE, page 867-872. IEEE Computer Society, (2010)Atlas: Application Confidentiality in Compromised Embedded Systems., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (3): 415-423 (2019)Constructing Application-Specific Memory Hierarchies on FPGAs., , , and . Trans. High Perform. Embed. Archit. Compil., (2011)Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP., , , , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 106-118. Springer, (2005)Security for Ambient Intelligent Systems., , , and . Ambient Intelligence, Springer, (2005)Microcoded coprocessor for embedded secure biometric authentication systems., , and . CODES+ISSS, page 130-135. ACM, (2005)