Author of the publication

Implementing Cryptography for Packet Level Authentication.

. Security and Management, page 475-480. CSREA Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bit-Sliced Binary Normal Basis Multiplication., and . IEEE Symposium on Computer Arithmetic, page 205-212. IEEE Computer Society, (2011)Implementing Cryptography for Packet Level Authentication.. Security and Management, page 475-480. CSREA Press, (2008)Memory Tampering Attack on Binary GCD Based Inversion Algorithms., , , and . International Journal of Parallel Programming, 47 (4): 621-640 (2019)Practical realisation and elimination of an ECC-related software bug attack., , , and . IACR Cryptology ePrint Archive, (2011)Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob., and . IACR Cryptology ePrint Archive, (2014)Constant-Time Callees with Variable-Time Callers., and . IACR Cryptology ePrint Archive, (2016)Start your ENGINEs: dynamically loadable contemporary crypto., and . IACR Cryptology ePrint Archive, (2018)Fast Point Decompression for Standard Elliptic Curves., and . EuroPKI, volume 5057 of Lecture Notes in Computer Science, page 134-149. Springer, (2008)Differential Properties of Elliptic Curves and Blind Signatures., and . ISC, volume 4779 of Lecture Notes in Computer Science, page 376-389. Springer, (2007)Practical Realisation and Elimination of an ECC-Related Software Bug Attack., , , and . CT-RSA, volume 7178 of Lecture Notes in Computer Science, page 171-186. Springer, (2012)