Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Implementation of Pairings., , , , and . Identity-Based Cryptography, volume 2 of Cryptology and Information Security Series, IOS Press, (2009)Distributed shuffle index: Analysis and implementation in an industrial testbed., , , , , , , and . CNS, page 396-397. IEEE, (2017)A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem., , , , and . ARC, volume 5453 of Lecture Notes in Computer Science, page 355-361. Springer, (2009)FPGA Implementations of SHA-3 Candidates: CubeHash, Grøstl, Lane, Shabal and Spectral Hash., , , , , , and . IACR Cryptology ePrint Archive, (2009)Versatile architectures for decoding a class of LDPC codes., , and . ECCTD, page 269-272. IEEE, (2005)FPGA Implementations of SHA-3 Candidates: CubeHash, Grostl, LANE, Shabal and Spectral Hash., , , , , , and . DSD, page 783-790. IEEE Computer Society, (2009)Versatile processor for GF(pm) arithmetic for use in cryptographic applications., , and . IET Comput. Digit. Tech., 2 (4): 253-264 (2008)Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem., , , , and . J. Comput., 2 (10): 52-62 (2007)FPGA Implementations of the Round Two SHA-3 Candidates., , , , , , and . FPL, page 400-407. IEEE Computer Society, (2010)Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study., , , and . CLOSER (2), page 138-145. SciTePress, (2016)978-989-758-182-3.