Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Customizable sponge-based authenticated encryption using 16-bit S-boxes., , , , and . MILCOM, page 43-48. IEEE, (2015)Minimizing performance overhead in memory encryption., , and . J. Cryptogr. Eng., 3 (2): 129-138 (2013)Memory Protection with Dynamic Authentication Trees., , and . MIXDES, page 202-207. IEEE, (2022)Mission control: A performance metric and analysis of control logic for pipelined architectures on FPGAs., , , and . ReConFig, page 1-6. IEEE, (2014)Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm., , , , and . MILCOM, page 1-5. IEEE, (2018)Design of a Flexible Schönhage-Strassen FFT Polynomial Multiplier with High- Level Synthesis to Accelerate HE in the Cloud., , and . ReConFig, page 1-5. IEEE, (2019)Implantable Medical Device Communication Security: Pattern vs. Signal Encryption., , and . HealthSec, USENIX Association, (2011)Versatile FPGA Architecture for Skein Hashing Algorithm., and . ReConFig, page 268-273. IEEE Computer Society, (2011)Solving the Cross Domain Problem with Functional Encryption., , , , and . MILCOM, page 49-54. IEEE, (2021)Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm., , , , and . MIXDES, page 154-159. IEEE, (2023)