Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 267-292 (2018)Atlas: Application Confidentiality in Compromised Embedded Systems., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (3): 415-423 (2019)Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP., , , , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 106-118. Springer, (2005)Constructing Application-Specific Memory Hierarchies on FPGAs., , , and . Trans. High Perform. Embed. Archit. Compil., (2011)Securing Embedded Systems., , , and . IEEE Secur. Priv., 4 (2): 40-49 (2006)Security for Ambient Intelligent Systems., , , and . Ambient Intelligence, Springer, (2005)Microcoded coprocessor for embedded secure biometric authentication systems., , and . CODES+ISSS, page 130-135. ACM, (2005)HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA., , and . IEEE Trans. Computers, 69 (8): 1185-1196 (2020)Compact and Flexible FPGA Implementation of Ed25519 and X25519., and . ACM Trans. Embed. Comput. Syst., 18 (3): 24:1-24:21 (2019)Skiing the embedded systems mountain., and . ACM Trans. Embed. Comput. Syst., 4 (3): 529-548 (2005)