Author of the publication

SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures.

, , , , , , , and . J. Cryptogr. Eng., 14 (1): 35-41 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conference Report: Abduction and Induction in AI; Logic, Proofs and Algorithms; Logic in Natural Language; Logic for Concurrency and Synchronisation (LOCUS)., , , and . Logic Journal of the IGPL, 6 (4): 651-663 (1998)Conference Report: Logic, Proofs and Algorithms; Logic in Natural Language; Logic for Concurrency and Synchronisation (LOCUS)., and . Logic Journal of the IGPL, 6 (4): 651-663 (1998)22nd Workshop on Logic, Language, Information and Computation (WoLLIC 2015)., , , and . Logic Journal of the IGPL, 24 (5): 859 (2016)Reviewing some clauses of cloud-based Google's Agreements in Brazil., and . LatinCloud, page 47-52. IEEE, (2013)Logic, Language, Information and Computation., and . Ann. Pure Appl. Log., 152 (1-3): 1-2 (2008)A New Basic Set of Transformations between Proofs., and . We Will Show Them! (2), page 499-528. College Publications, (2005)Towards a homotopy domain theory., and . Arch. Math. Log., 62 (3-4): 559-579 (May 2023)Preface., and . WoLLIC, volume 123 of Electronic Notes in Theoretical Computer Science, page 1-3. Elsevier, (2004)Editorial.. Logic Journal of the IGPL, 3 (4): 532-533 (1995)Labelled Abduction., and . SBIA, volume 991 of Lecture Notes in Computer Science, page 91-100. Springer, (1995)