Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Gueron, Shay
add a person with the name Gueron, Shay
 

Other publications of authors with the same name

Applications of The Montgomery Exponent., and . ITCC (1), page 620-625. IEEE Computer Society, (2005)Balanced Permutations Even-Mansour Ciphers., , and . Cryptography, 1 (1): 2 (2017)Efficient software implementations of modular exponentiation.. J. Cryptographic Engineering, 2 (1): 31-43 (2012)New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures., , and . IMA Int. Conf., volume 4887 of Lecture Notes in Computer Science, page 185-203. Springer, (2007)Using Scan Side Channel for Detecting IP Theft., , , and . HASP@ISCA, page 1:1-1:8. ACM, (2016)Enhanced Montgomery Multiplication.. CHES, volume 2523 of Lecture Notes in Computer Science, page 46-56. Springer, (2002)Fault Attacks on Encrypted General Purpose Compute Platforms., , , , and . CODASPY, page 197-204. ACM, (2017)Paillier-encrypted databases with fast aggregated queries., and . CCNC, page 848-853. IEEE, (2017)White Box AES Using Intel's New AES Instructions.. ITNG, page 417-421. IEEE Computer Society, (2013)Particle based modelling methods applied in biology., and . Future Generation Comp. Syst., (2001)