Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RAIDq: A Software-friendly, Multiple-parity RAID., , and . HotStorage, USENIX Association, (2013)A Practical Experience with RFID Security., , , , and . Mobile Data Management, page 395-396. IEEE Computer Society, (2009)Portable Implementation of Lattice-based Cryptography using JavaScript., , , , and . IJNC, 6 (2): 309-327 (2016)Faster Multiplication for Long Binary Polynomials., , , , and . CoRR, (2017)Breaking ECC2K-130., , , , , , , , , and 13 other author(s). IACR Cryptology ePrint Archive, (2009)Securing M2M With Post-Quantum Public-Key Cryptography., , , , , , , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 3 (1): 106-116 (2013)Efficient Implementation of the etaT Pairing on GPU., , , and . IACR Cryptology ePrint Archive, (2011)Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation., , , , , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 637-647. (2016)ECC2K-130 on NVIDIA GPUs., , , , , , and . INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 328-346. Springer, (2010)Gauss Sieve Algorithm on GPUs., , , and . CT-RSA, volume 10159 of Lecture Notes in Computer Science, page 39-57. Springer, (2017)