From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design., , , , , , и . FPL, стр. 397-403. IEEE, (2019)Face-off Between the CAESAR Lightweight Finalists: ACORN vs. Ascon., , , и . FPT, стр. 330-333. IEEE, (2018)COMA: Communication and Obfuscation Management Architecture., , , , , , , и . RAID, стр. 181-195. USENIX Association, (2019)Side-channel Resistant Implementations of a Novel Lightweight Authenticated Cipher with Application to Hardware Security., , , , и . ACM Great Lakes Symposium on VLSI, стр. 229-234. ACM, (2021)Comparison of hardware and software implementations of selected lightweight block ciphers., , , , и . FPL, стр. 1-4. IEEE, (2017)Improved Lightweight Implementations of CAESAR Authenticated Ciphers., , , , и . FCCM, стр. 29-36. IEEE Computer Society, (2018)Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon., , , , и . IACR Cryptology ePrint Archive, (2019)Fixing the CLOC with Fine-grain Leakage Analysis., , , , и . ASHES@CCS, стр. 75-80. ACM, (2018)Minerva: Automated hardware optimization tool., , , и . ReConFig, стр. 1-8. IEEE, (2017)A universal hardware API for authenticated ciphers., , , , , и . ReConFig, стр. 1-8. IEEE, (2015)