Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threshold Implementations of <tt>GIFT</tt>: A Trade-Off Analysis., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Effects of Adaptive Behaviors and Shared Mental Models on Control Crew Performance., , and . Manag. Sci., 50 (11): 1534-1544 (2004)MemEnc: A Lightweight, Low-Power, and Transparent Memory Encryption Engine for IoT., , and . IEEE Internet Things J., 8 (9): 7182-7191 (2021)PQC Acceleration Using GPUs: FrodoKEM, NewHope, and Kyber., , , and . IEEE Trans. Parallel Distributed Syst., 32 (3): 575-586 (2021)SoCFaSe: in quest for fast and secure SoC architectures. Nanyang Technological University, Singapore, (2023)Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes., , , , and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 383-401. Springer, (2016)Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium., , , and . IACR Cryptol. ePrint Arch., (2022)Towards Designing a Secure RISC-V System-on-Chip: ITUS., , , , , , and . J. Hardw. Syst. Secur., 4 (4): 329-342 (2020)XMSS and Embedded Systems., , , , , , and . SAC, volume 11959 of Lecture Notes in Computer Science, page 523-550. Springer, (2019)XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V., , , , , , and . IACR Cryptology ePrint Archive, (2018)