Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiplying boolean Polynomials with Frobenius Partitions in Additive Fast Fourier Transform., , , , and . CoRR, (2018)Solving Quadratic Equations with XL on Parallel Architectures - extended version., , , and . IACR Cryptology ePrint Archive, (2016)ECM on Graphics Cards., , , , and . IACR Cryptology ePrint Archive, (2008)Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild., , , , , , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 341-360. Springer, (2013)MIMO-OFDM PHY Integrated (MOPI) Scheme for Confidential Wireless Transmission., , , and . WCNC, page 1-6. IEEE, (2010)Use of spectral analysis in defense against DoS attacks., , and . GLOBECOM, page 2143-2148. IEEE, (2002)Implementing 128-Bit Secure MPKC Signatures., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (3): 553-569 (2018)Certificate Management Scheme for VANETs Using Blockchain Structure., , , , , and . Cryptogr., 6 (2): 20 (2022)Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables., , and . DSC, page 1-2. IEEE, (2021)COCA: Computation Offload to Clouds Using AOP., , and . CCGRID, page 466-473. IEEE Computer Society, (2012)