Author of the publication

Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers.

, , , and . FiCloud Workshops, page 231-236. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative Decoding of Trellis-Constrained Codes inspired by Amplitude Amplification (Preliminary Version).. CoRR, (2019)Some properties of Homogenous Trellis-Constrained Codes., and . ISTC, page 266-270. IEEE, (2016)Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks., , and . MSPN, volume 12605 of Lecture Notes in Computer Science, page 89-109. Springer, (2020)Dining Cryptographers with 0.924 Verifiable Collision Resolution.. Ann. UMCS Informatica, 14 (1): 49-59 (2014)Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers., and . SecITC, volume 13195 of Lecture Notes in Computer Science, page 86-99. Springer, (2021)Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves., and . MSPN, volume 10566 of Lecture Notes in Computer Science, page 1-17. Springer, (2017)Lightweight EdDSA Signature Verification for the Ultra-Low-Power Internet of Things., , and . ISPEC, volume 13107 of Lecture Notes in Computer Science, page 263-282. Springer, (2021)Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers., , , and . FiCloud Workshops, page 231-236. IEEE Computer Society, (2018)Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things., , , , , and . SecITC, volume 13809 of Lecture Notes in Computer Science, page 17-36. Springer, (2022)Protection of MV/LV solid-state transformers in the distribution grid., , , , and . IECON, page 3531-3538. IEEE, (2015)