From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Microarchitectural Attacks and Countermeasures., и . Cryptographic Engineering, Springer, (2009)Trace-Driven Cache Attacks on AES., и . IACR Cryptology ePrint Archive, (2006)Parameter Space for the Architecture of FFT-Based Montgomery Modular Multiplication., , , , и . IEEE Trans. Computers, 65 (1): 147-160 (2016)A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)., , и . CHES, том 1965 из Lecture Notes in Computer Science, стр. 277-292. Springer, (2000)Improving Brumley and Boneh timing attack on unprotected SSL implementations., , и . CCS, стр. 139-146. ACM, (2005)A Versatility-Performance Balanced Hardware Architecture for Scene Text Detection., , , , , , и . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, стр. 540-549. IEEE, (2022)Hardware Trojans in incompletely specified on-chip bus systems., , , и . DATE, стр. 527-530. IEEE, (2016)Continuous-Time Computational Aspects of Cyber-Physical Security., , и . FDTC, стр. 59-62. IEEE Computer Society, (2016)Reducing the Complexity of Normal Basis Multiplication., и . WAIFI, том 9061 из Lecture Notes in Computer Science, стр. 61-80. Springer, (2014)FPGA Implementation of an Elliptic Curve Cryptosystem over GF(3^m)., , и . ReConFig, стр. 397-402. IEEE Computer Society, (2008)