Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing., , and . INDOCRYPT, volume 9462 of Lecture Notes in Computer Science, page 25-44. Springer, (2015)Post Quantum ECC on FPGA Platform., and . IACR Cryptology ePrint Archive, (2019)Redefining the Transparency Order., , , , and . IACR Cryptology ePrint Archive, (2014)Accelerating OpenSSL's ECC with low cost reconfigurable hardware., , , and . ISIC, page 1-4. IEEE, (2016)RAPPER: Ransomware Prevention via Performance Counters., , , and . CoRR, (2018)DFARPA: Differential fault attack resistant physical design automation., , , , , , , and . DATE, page 1171-1174. IEEE, (2018)BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS., , , , and . iThings/GreenCom/CPSCom/SmartData, page 1326-1335. IEEE, (2018)Trustworthy proofs for sensor data using FPGA based physically unclonable functions., , , and . DATE, page 1504-1507. IEEE, (2018)Cellular automata based key agreement., and . ICETE, page 262-267. INSTICC Press, (2005)PUFs as Promising Tools for Security in Internet of Things.. IEEE Des. Test, 33 (3): 103-115 (2016)