Author of the publication

Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.

, , , , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 105-118. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture., , , and . SECRYPT, page 105-113. SciTePress, (2011)NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer., , , and . AsiaCCS, page 305-315. ACM, (2016)Chord: Thwarting Relay Attacks Among Near Field Communications., , , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 329-348. Springer, (2018)Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication., , , , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 346-355. Springer, (2015)Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA., , , , and . TrustCom, page 436-442. IEEE Computer Society, (2012)Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA., , , , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 105-118. Springer, (2012)MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (5): 3494-3507 (2022)eHIFS: An Efficient History Independent File System., , , and . AsiaCCS, page 573-585. ACM, (2019)Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting., , , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 284-299. (2016)MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer., , , , and . CODASPY, page 327-338. ACM, (2019)