From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Tweaks To Design Fault Resistant Ciphers., , и . IACR Cryptology ePrint Archive, (2015)Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography., , , , , , и . IACR Cryptol. ePrint Arch., (2021)Secure public key hardware for IoT applications., , и . MWSCAS, стр. 1-4. IEEE, (2016)Cryptographically Secure Multi-tenant Provisioning of FPGAs., , , и . SPACE, том 12586 из Lecture Notes in Computer Science, стр. 208-225. Springer, (2020)Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers., , , , и . IACR Cryptology ePrint Archive, (2019)High-Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves., и . IEEE Trans. Very Large Scale Integr. Syst., 27 (7): 1587-1600 (2019)Minimalistic Perspective to Public Key Implementations on FPGA., и . ISVLSI, стр. 381-386. IEEE Computer Society, (2018)Role of power grid in side channel attack and power-grid-aware secure design., , , , , , , и . DAC, стр. 78:1-78:9. ACM, (2013)Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography., , , , и . J. Cryptogr. Eng., 14 (1): 1-18 (апреля 2024)Multiplierless Design of High-Speed Very Large Constant Multiplications., , , и . CoRR, (2023)