Author of the publication

Accelerated AES implementations via generalized instruction set extensions.

. J. Comput. Secur., 16 (3): 265-288 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Desktop Security and Usability Trade-Offs: An Evaluation of Password Management Systems., and . Inf. Secur. J. A Glob. Perspect., 14 (2): 10-19 (2005)Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography., and . ACSAC, page 465-474. IEEE Computer Society, (2008)Understanding Internet Protocol Security., and . Information Systems Security, 13 (4): 39-43 (2004)Who are you? How to protect against identity theft.. IEEE Technol. Soc. Mag., 24 (2): 5-8 (2005)Accelerated AES implementations via generalized instruction set extensions.. J. Comput. Secur., 16 (3): 265-288 (2008)Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions., and . IEEE Trans. Very Large Scale Integr. Syst., 18 (11): 1505-1518 (2010)Information warfare: are you at risk?. IEEE Technol. Soc. Mag., 22 (4): 13-19 (2003)Fast and Efficient Implementation of AES via Instruction Set Extensions.. AINA Workshops (1), page 396-403. IEEE Computer Society, (2007)NTRU in Constrained Devices., , , , and . CHES, volume 2162 of Lecture Notes in Computer Science, page 262-272. Springer, (2001)