Author of the publication

A workload characterization of elliptic curve cryptography methods in embedded environments.

, , and . SIGARCH Comput. Archit. News, 32 (3): 27-34 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WebMIPS: a new web-based MIPS simulation environment for computer architecture education., , and . WCAE, page 19. ACM, (2004)NEUROM: a ROM based RNS digital neuron., and . Neural Networks, 18 (2): 179-189 (2005)An Approach to the Design of Hardware Curve Generators for Graphic Displays., , and . Eurographics, North-Holland / Eurographics Association, (1984)Inductive Inference of Tree Automata by Recursive Neural Networks., , , , and . AI*IA, volume 1321 of Lecture Notes in Computer Science, page 36-47. Springer, (1997)A VLSI architecture for RNS with MI adders., and . Integr., 11 (1): 67-83 (1991)Production and representation of computer system simulation models., , and . ANSS, page 205-212. IEEE, (1976)Table Look-up Graphic Interpolation., , , and . Eurographics, North-Holland / Eurographics Association, (1985)LSI components modelling in a three-valued functional simulation., , , and . DAC, page 428-438. ACM, (1978)Learning User Profiles in NAUTILUS., , , and . AH, volume 1892 of Lecture Notes in Computer Science, page 323-326. Springer, (2000)A workload characterization of elliptic curve cryptography methods in embedded environments., , and . SIGARCH Comput. Archit. News, 32 (3): 27-34 (2004)