Author of the publication

Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2n).

, , , and . ASAP, page 350-355. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems., , and . CCNC, page 766-774. IEEE, (2022)Cryptanalysis of SPEEDY., , , , , and . ACISP, volume 13915 of Lecture Notes in Computer Science, page 124-156. Springer, (2023)Authentication and Payment in Future Mobile Systems., and . ESORICS, volume 1485 of Lecture Notes in Computer Science, page 277-293. Springer, (1998)Remote Attestation on Legacy Operating Systems With Trusted Platform Modules., , and . REM@ESORICS, volume 197 of Electronic Notes in Theoretical Computer Science, page 59-72. Elsevier, (2007)An FPGA implementation of an elliptic curve processor GF(2m)., , and . ACM Great Lakes Symposium on VLSI, page 454-457. ACM, (2004)Applications of Multivariate Quadratic Public Key Systems., and . Sicherheit, volume P-62 of LNI, page 413-424. GI, (2005)The Belgian Electronic Identity Card (Overview)., , and . Sicherheit, volume P-77 of LNI, page 298-301. GI, (2006)Probabilistic Algebraic Attacks., and . IMACC, volume 3796 of Lecture Notes in Computer Science, page 290-303. Springer, (2005)On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions., , , and . IMACC, volume 2898 of Lecture Notes in Computer Science, page 82-92. Springer, (2003)Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment., , and . CHES, volume 7428 of Lecture Notes in Computer Science, page 268-282. Springer, (2012)