Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic technologies and protocol standards for Internet of Things., , and . Internet Things, (2021)Network on Privacy-Aware Audio-and Video-Based Applications for Active and Assisted Living: GoodBrother Project., , and . DSD, page 748-753. IEEE, (2022)A low power fault secure timer implementation based on the Gray encoding scheme., , , and . ICECS, page 537-540. IEEE, (2002)Secure and Efficient RNS Software Implementation for Elliptic Curve Cryptography., , and . EuroS&P Workshops, page 86-93. IEEE, (2017)BLAKE HASH Function Family on FPGA: From the Fastest to the Smallest., and . ISVLSI, page 139-142. IEEE Computer Society, (2010)Design and Implementation of a Privacy Framework for the Internet of Things (IoT)., , and . DSD, page 586-591. IEEE Computer Society, (2018)Random number generator architecture and VLSI implementation., , , and . ISCAS (4), page 854-857. IEEE, (2002)Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems., , , , and . ISCAS, page 2025-2028. IEEE, (2015)Challenges in designing trustworthy cryptographic co-processors., , , , , , , , , and 2 other author(s). ISCAS, page 2009-2012. IEEE, (2015)Post-Quantum Signature Schemes for Efficient Hardware Implementation., , and . NTMS, page 1-5. IEEE, (2019)