Author of the publication

Silicon-Proven ASIC Design for the Polynomial Operations of Fully Homomorphic Encryption.

, , , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (6): 1924-1928 (June 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering., , and . CPSS@AsiaCCS, page 15-20. ACM, (2017)TERMinator Suite: Benchmarking Privacy-Preserving Architectures., , and . IACR Cryptology ePrint Archive, (2017)Privilege escalation attack through address space identifier corruption in untrusted modern processors.. DTIS, page 161-166. IEEE, (2013)Extending residue-based fault tolerance to encrypted computation., and . ITC, page 1-10. IEEE, (2015)Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware., , , and . EuroS&P, page 369-384. IEEE, (2021)ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code., , and . CPSS@AsiaCCS, page 60-71. ACM, (2023)Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications., , , , and . CPSIOTSEC@CCS, page 83-89. ACM, (2023)Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic., , , and . ICCAD, page 100:1-100:9. ACM, (2022)Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining., , , and . CPSIOTSEC@CCS, page 31-36. ACM, (2020)A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation., and . CPS-SPC@CCS, page 81-92. ACM, (2016)