Author of the publication

Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2n).

, , , and . ASAP, page 350-355. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors., , , and . SP, page 45-60. IEEE Computer Society, (2009)Streaming Encryption for a Secure Wavelength and Time Domain Hopped Optical Network., , , , and . ITCC (2), page 578-582. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.VLSI Design Methods for Low Power Embedded Encryption.. ACM Great Lakes Symposium on VLSI, page 7. ACM, (2016)Embedded Security., , and . VLSID, page 23. IEEE Computer Society, (2016)Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration., , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 346-362. Springer, (2008)Atlas: Application Confidentiality in Compromised Embedded Systems., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (3): 415-423 (2019)Security for Ambient Intelligent Systems., , , and . Ambient Intelligence, Springer, (2005)Microcoded coprocessor for embedded secure biometric authentication systems., , and . CODES+ISSS, page 130-135. ACM, (2005)ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 267-292 (2018)Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP., , , , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 106-118. Springer, (2005)