Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2022)Construction Site Safety Management: A Computer Vision and Deep Learning Approach., and . Sensors, 23 (2): 944 (January 2023)Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 1-26 (2021)AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). CCS, page 401-415. ACM, (2023)Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium., , , , , , , and . IEEE Access, (2023)Contactless Elevator Button Control System Based on Weighted K-NN Algorithm for AI Edge Computing Environment., , and . J. Web Eng., (2022)Efficient Implementations of Rainbow and UOV using AVX2., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 245-269 (2022)Supervisory control and data acquisition for Standalone Hybrid Power Generation Systems., , , , and . Sustain. Comput. Informatics Syst., (2018)A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure., , , and . IEEE Access, (2019)Designing Hand Pose Aware Virtual Keyboard With Hand Drift Tolerance., , , , , and . IEEE Access, (2019)