Author of the publication

Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID.

, , and . ICITST, page 1-6. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability analysis for crypto devices against probing attack., , , , , and . ASP-DAC, page 827-832. IEEE, (2015)Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID., , and . ICITST, page 1-6. IEEE, (2009)IBIHOP: Proper Privacy Preserving Mutual RFID Authentication., , and . RFIDSec Asia, volume 11 of Cryptology and Information Security Series, page 45-56. IOS Press, (2013)On the Claimed Privacy of EC-RAC III., , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 66-74. Springer, (2010)Faster Pairing Coprocessor Architecture., , , and . Pairing, volume 7708 of Lecture Notes in Computer Science, page 160-176. Springer, (2012)Design and design methods for unified multiplier and inverter and its application for HECC., , and . Integration, 44 (4): 280-289 (2011)Elliptic curve cryptography on embedded multicore systems., , and . Design Autom. for Emb. Sys., 12 (3): 231-242 (2008)Montgomery Modular Multiplication Algorithm on Multi-Core Systems., , and . SiPS, page 261-266. IEEE, (2007)Implementation of binary edwards curves for very-constrained devices., , and . ASAP, page 185-191. IEEE Computer Society, (2010)On the Use of Scan Chain to Improve Physical Attacks (Extended Abstract)., , and . ATS, page 354-357. IEEE Computer Society, (2014)