Author of the publication

Exploring Generalization of Shoup Modular Multiplier.

, , and . ACM Great Lakes Symposium on VLSI, page 222-227. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering., , and . CPSS@AsiaCCS, page 15-20. ACM, (2017)TERMinator Suite: Benchmarking Privacy-Preserving Architectures., , and . IACR Cryptology ePrint Archive, (2017)Privilege escalation attack through address space identifier corruption in untrusted modern processors.. DTIS, page 161-166. IEEE, (2013)Extending residue-based fault tolerance to encrypted computation., and . ITC, page 1-10. IEEE, (2015)Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining., , , and . CPSIOTSEC@CCS, page 31-36. ACM, (2020)A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation., and . CPS-SPC@CCS, page 81-92. ACM, (2016)ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code., , and . CPSS@AsiaCCS, page 60-71. ACM, (2023)Advanced Techniques for Designing Stealthy Hardware Trojans., , and . DAC, page 174:1-174:4. ACM, (2014)IFFSET: In-Field Fuzzing of Industrial Control Systems using System Emulation., and . DATE, page 662-665. IEEE, (2020)Investigating the limits of AVF analysis in the presence of multiple bit errors., , and . IOLTS, page 49-54. IEEE, (2013)