Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Secure Broadcasting Scheme Realizing Information Granularity., , , and . J. Inf. Sci. Eng., 26 (4): 1509-1523 (2010)Streamlined NTRU Prime on FPGA., , , , and . J. Cryptogr. Eng., 13 (2): 167-186 (June 2023)Power Analysis on NTRU Prime., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (1): 123-151 (2020)Securing M2M With Post-Quantum Public-Key Cryptography., , , , , , , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 3 (1): 106-116 (2013)Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms., , , , and . IWSEC, volume 13504 of Lecture Notes in Computer Science, page 3-23. Springer, (2022)Gauss Sieve Algorithm on GPUs., , , and . CT-RSA, volume 10159 of Lecture Notes in Computer Science, page 39-57. Springer, (2017)Tractable Rational Map Signature., , , , and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 244-257. Springer, (2005)RAIDq: A Software-friendly, Multiple-parity RAID., , and . HotStorage, USENIX Association, (2013)Fast Exhaustive Search for Polynomial Systems in F2., , , , , , and . CHES, volume 6225 of Lecture Notes in Computer Science, page 203-218. Springer, (2010)Solving Quadratic Equations with XL on Parallel Architectures., , , and . CHES, volume 7428 of Lecture Notes in Computer Science, page 356-373. Springer, (2012)