Author of the publication

A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography.

, and . TrustCom/BigDataSE/ISPA (1), page 392-399. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strategy of Relations Collection in Factoring RSA Modulus., and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 199-211. Springer, (2015)An efficient method for integer factorization., and . ISCAS, page 73-76. IEEE, (2015)A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography., and . TrustCom/BigDataSE/ISPA (1), page 392-399. IEEE, (2015)Exploring the speed limit of SM2., and . CCIS, page 456-460. IEEE, (2014)Towards efficient discrete Gaussian sampling for lattice-based cryptography., and . FPL, page 1-6. IEEE, (2015)Stability Conditions for Discrete Hopfield Neural Networks with Delay., and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 476-481. Springer, (2006)A Novel Technique for Ring Oscillator Based PUFs to Enroll Stable Challenge Response Pairs., and . CIT, page 270-275. IEEE Computer Society, (2014)Specific hardware implementation for cofactorization in GNFS., and . CITS, page 1-5. IEEE, (2016)Ultra High-Speed SM2 ASIC Implementation., and . TrustCom, page 182-188. IEEE Computer Society, (2014)On trojan side channel design and identification., , , , , , and . ICCAD, page 278-285. IEEE, (2014)