Author of the publication

Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES.

, , , and . FPL, volume 2778 of Lecture Notes in Computer Science, page 181-193. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group Authentication Protocol for Mobile Networks., , and . WiMob, page 28. IEEE Computer Society, (2007)How can we overcome both side channel analysis and fault attacks on RSA-CRT?, and . FDTC, page 21-29. IEEE Computer Society, (2007)Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences., and . Journal of Computer Security, 5 (3): 213-224 (1997)Compact elliptic curve representations., , and . J. Mathematical Cryptology, 5 (1): 89-100 (2011)Electromagnetic Attack., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Can GOST Be Made Secure Against Differential Cryptanalysis?, , , , and . Cryptologia, 39 (2): 145-156 (2015)Which directions for asymmetric watermarking?, and . EUSIPCO, page 1-4. IEEE, (2002)Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps., , , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 515-532. Springer, (2005)Updates on the Security of FPGAs Against Power Analysis Attacks., , , and . ARC, volume 3985 of Lecture Notes in Computer Science, page 335-346. Springer, (2006)A New Parallelism Management Scheme for Multiprocessor Systems., , , and . ACPC, volume 1557 of Lecture Notes in Computer Science, page 246-256. Springer, (1999)