Author of the publication

Hardware Implementation of the Binary Method for Exponentiation in GF(2m).

, , and . ENC, page 131-134. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomials., , , and . Des. Codes Cryptography, 45 (1): 19-37 (2007)A Fast Implementation of Multiplicative Inversion Over GF(2m)., , and . ITCC (1), page 574-579. IEEE Computer Society, (2005)A GPU Parallel Implementation of the RSA Private Operation., , , and . CARLA, volume 697 of Communications in Computer and Information Science, page 188-203. (2016)High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves., , , , , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 21-39. Springer, (2010)Design and implementation of a constant-time FPGA accelerator for fast elliptic curve cryptography., , , and . ReConFig, page 1-8. IEEE, (2016)A reconfigurable processor for high speed point multiplication in elliptic curves., , and . Int. J. Embed. Syst., 1 (3/4): 237-249 (2005)Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level., , , , and . Microprocess. Microsystems, (2018)Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes., , , and . IEEE Trans. Computers, 62 (2): 279-294 (2013)Polynomial Time Cryptanalytic Extraction of Neural Network Models., , , , , and . CoRR, (2023)Achieving Confidentiality Security Service for CAN., , and . CONIELECOMP, page 166-170. IEEE Computer Society, (2005)