From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Elliptic and Hyperelliptic Curves: a Practical Security Analysis., , и . IACR Cryptology ePrint Archive, (2013)Microprocessor fault-tolerance via on-the-fly partial reconfiguration., , , и . ETS, стр. 201-206. IEEE Computer Society, (2010)Buffer overflow vulnerabilities in CUDA: a preliminary analysis.. CoRR, (2015)Efficient Ephemeral Elliptic Curve Cryptographic Keys., и . ISC, том 9290 из Lecture Notes in Computer Science, стр. 524-547. Springer, (2015)Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields., , , и . CHES, том 9813 из Lecture Notes in Computer Science, стр. 517-537. Springer, (2016)FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields., , , и . IACR Cryptology ePrint Archive, (2016)On the Analysis of Public-Key Cryptologic Algorithms.. EPFL, Switzerland, (2015)Efficient Update of Encrypted Files for Cloud Storage., и . UCC, стр. 565-570. IEEE Computer Society, (2015)Cofactorization on Graphics Processing Units., , , и . CHES, том 8731 из Lecture Notes in Computer Science, стр. 335-352. Springer, (2014)An efficient many-core architecture for Elliptic Curve Cryptography security assessment., , , и . FPL, стр. 1-6. IEEE, (2015)