Author of the publication

Architectural Design Features of a Programmable High Throughput AES Coprocessor.

, , and . ITCC (2), page 498-502. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editors' Introduction: Security and Trust in Embedded-Systems Design., and . IEEE Des. Test Comput., 24 (6): 518-520 (2007)Synthesis of multi-rate and variable rate circuits for high speed telecommunications applications., , , , and . ED&TC, page 542-546. IEEE Computer Society, (1997)Hardware/software partitioning of embedded system in OCAPI-xl., , , , and . CODES, page 30-35. ACM, (2001)Differential Power Analysis of MAC-Keccak at Any Key-Length., and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 68-82. Springer, (2013)Offline Hardware/Software Authentication for Reconfigurable Platforms., and . CHES, volume 4249 of Lecture Notes in Computer Science, page 311-323. Springer, (2006)Design of Cam-E-leon, a Run-Time Reconfigurable Web Camera., , , , , , , , , and . Embedded Processor Design Challenges, volume 2268 of Lecture Notes in Computer Science, page 274-290. Springer, (2002)A Robust Physical Unclonable Function With Enhanced Challenge-Response Set., , and . IEEE Trans. Inf. Forensics Secur., 7 (1): 333-345 (2012)Threat Modeling and Risk Analysis for Miniaturized Wireless Biomedical Devices., , , and . IEEE Internet Things J., 9 (15): 13338-13352 (2022)ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (1): 301-325 (2023)SIA: Secure Intermittent Architecture for Off-the-Shelf Resource-Constrained Microcontrollers., , and . HOST, page 208-217. IEEE, (2019)