Author of the publication

A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2).

, , , , and . FCCM, page 237-248. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection., , , , and . IACR Cryptology ePrint Archive, (2018)Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts., , and . TCC (B2), volume 9986 of Lecture Notes in Computer Science, page 146-168. (2016)Non-malleability vs. CCA-Security: The Case of Commitments., , , and . Public Key Cryptography (2), volume 10770 of Lecture Notes in Computer Science, page 312-337. Springer, (2018)Computational aspects of cryptography and cryptanalysis.. Ruhr University Bochum, (2009)Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications., , , and . Integration, 44 (4): 290-304 (2011)New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs., , , , and . ACM Conference on Computer and Communications Security, page 1547-1564. ACM, (2017)P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems., , , and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 205-212. Springer, (2013)Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems., , , , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 489-505. Springer, (2008)Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations., , , , and . CRYPTO (1), volume 8616 of Lecture Notes in Computer Science, page 261-279. Springer, (2014)Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?., , , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 45-61. Springer, (2008)