Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elliptic and Hyperelliptic Curves: a Practical Security Analysis., , and . IACR Cryptology ePrint Archive, (2013)Microprocessor fault-tolerance via on-the-fly partial reconfiguration., , , and . ETS, page 201-206. IEEE Computer Society, (2010)Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields., , , and . CHES, volume 9813 of Lecture Notes in Computer Science, page 517-537. Springer, (2016)Efficient Ephemeral Elliptic Curve Cryptographic Keys., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 524-547. Springer, (2015)On the Analysis of Public-Key Cryptologic Algorithms.. EPFL, Switzerland, (2015)Efficient Update of Encrypted Files for Cloud Storage., and . UCC, page 565-570. IEEE Computer Society, (2015)Buffer overflow vulnerabilities in CUDA: a preliminary analysis.. J. Comput. Virol. Hacking Tech., 12 (2): 113-120 (2016)Efficient many-core architecture design for cryptanalytic collision search on FPGAs., , , and . J. Inf. Secur. Appl., (2018)Automated synthesis of EDACs for FLASH memories with user-selectable correction capability., , , , and . HLDVT, page 113-120. IEEE Computer Society, (2010)Cofactorization on Graphics Processing Units., , , and . CHES, volume 8731 of Lecture Notes in Computer Science, page 335-352. Springer, (2014)