From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Elliptic and Hyperelliptic Curves: a Practical Security Analysis., , и . IACR Cryptology ePrint Archive, (2013)Microprocessor fault-tolerance via on-the-fly partial reconfiguration., , , и . ETS, стр. 201-206. IEEE Computer Society, (2010)Buffer overflow vulnerabilities in CUDA: a preliminary analysis.. J. Comput. Virol. Hacking Tech., 12 (2): 113-120 (2016)Efficient many-core architecture design for cryptanalytic collision search on FPGAs., , , и . J. Inf. Secur. Appl., (2018)Automated synthesis of EDACs for FLASH memories with user-selectable correction capability., , , , и . HLDVT, стр. 113-120. IEEE Computer Society, (2010)Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields., , , и . CHES, том 9813 из Lecture Notes in Computer Science, стр. 517-537. Springer, (2016)Efficient Ephemeral Elliptic Curve Cryptographic Keys., и . ISC, том 9290 из Lecture Notes in Computer Science, стр. 524-547. Springer, (2015)On the Analysis of Public-Key Cryptologic Algorithms.. EPFL, Switzerland, (2015)Efficient Update of Encrypted Files for Cloud Storage., и . UCC, стр. 565-570. IEEE Computer Society, (2015)An efficient many-core architecture for Elliptic Curve Cryptography security assessment., , , и . FPL, стр. 1-6. IEEE, (2015)