Author of the publication

Implementation of High Throughput XTS-SM4 Module for Data Storage Devices.

, , , , and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 271-290. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boosting Entropy Extraction of PDL-based RO PUF by High-order Difference Method., , , and . ACM Great Lakes Symposium on VLSI, page 59-64. ACM, (2020)Offline RFID Grouping Proofs with Trusted Timestamps., , , and . TrustCom, page 674-681. IEEE Computer Society, (2012)ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs., , , , , and . ISCC, page 1340-1343. IEEE, (2023)Learning to Select Prototypical Parts for Interpretable Sequential Data Modeling., , and . AAAI, page 6612-6620. AAAI Press, (2023)Bit Error Probability Evaluation of RO PUFs., , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 421-436. Springer, (2015)Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms., , , , , , , and . TrustCom, page 730-739. IEEE, (2023)Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper)., , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 347-356. Springer, (2015)A Privacy Enhancing Scheme for Mobile Devices Based Secure Multi-party Computation System., , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 291-308. Springer, (2019)Flush+Time: A High Accuracy and High Resolution Cache Attack On ARM-FPGA Embedded SoC., , , , and . VTS, page 1-6. IEEE, (2020)SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks., , , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 251-268. Springer, (2019)