Author of the publication

Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI.

, and . ISC, volume 2433 of Lecture Notes in Computer Science, page 48-62. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Morioka, Sumio
add a person with the name Morioka, Sumio
 

Other publications of authors with the same name

Design Methodology for a One-Shot Reed-Solomon Encoder and Decoder., and . ICCD, page 60-67. IEEE Computer Society, (1999)$\textscTWINE$ : A Lightweight Block Cipher for Multiple Platforms., , , and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 339-354. Springer, (2012)CLOC: Authenticated Encryption for Short Input., , , and . FSE, volume 8540 of Lecture Notes in Computer Science, page 149-167. Springer, (2014)Automatic Correctness Proof of the Implementation of Synchronous Sequential Circuits Using an Algebraic Approach., , , and . TPCD, volume 901 of Lecture Notes in Computer Science, page 165-184. Springer, (1994)Fault-Tolerant Refresh Power Reduction of DRAMs for Quasi-Nonvolatile Data Retention., , , and . DFT, page 311-318. IEEE Computer Society, (1999)Efficient Error Correction Code Configurations for Quasi-Nonvolatile Data Retention by DRAMs., , and . DFT, page 201-. IEEE Computer Society, (2000)Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI., and . ISC, volume 2433 of Lecture Notes in Computer Science, page 48-62. Springer, (2002)A Compact Rijndael Hardware Architecture with S-Box Optimization., , , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 239-254. Springer, (2001)Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology., , , , and . HOST, page 57-62. IEEE Computer Society, (2011)A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation., , , and . CHES, volume 9813 of Lecture Notes in Computer Science, page 538-558. Springer, (2016)