Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elliptic Curve Multiset Hash., , and . CoRR, (2016)Faster Homomorphic Encryption over GPGPUs via hierarchical DGT., , and . IACR Cryptol. ePrint Arch., (2020)TinyTate: Identity-Based Encryption for Sensor Networks., , , , , and . IACR Cryptol. ePrint Arch., (2007)Efficient implementation of elliptic curve cryptography in wireless sensors., , , and . Adv. Math. Commun., 4 (2): 169-187 (2010)Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction., , , , , and . J. Cryptogr. Eng., 1 (3): 187-199 (2011)Efficient and secure software implementations of Fantomas., , and . J. Cryptogr. Eng., 10 (3): 211-228 (2020)Faster Homomorphic Encryption over GPGPUs via Hierarchical DGT., , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 520-540. Springer, (2021)High-assurance field inversion for curve-based cryptography., , and . IACR Cryptol. ePrint Arch., (2021)The return of software vulnerabilities in the Brazilian voting machine., , , , and . Comput. Secur., (2019)High-Assurance Field Inversion for Curve-Based Cryptography., , and . CSF, page 552-567. IEEE, (2023)