Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PUF Interfaces and their Security., and . ISVLSI, page 25-28. IEEE Computer Society, (2014)Watermark Estimation through Detector Analysis., , and . ICIP (1), page 425-429. (1998)Path ORAM: An Extremely Simple Oblivious RAM Protocol., , , , , , , and . J. ACM, 65 (4): 18:1-18:26 (2018)Optimal Finite-Sum Smooth Non-Convex Optimization with SARAH., , , , , and . CoRR, (2019)Controlled physical random functions and applications., , , , , and . ACM Trans. Inf. Syst. Secur., 10 (4): 3:1-3:22 (2008)FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise., , , , , , and . Cryptography, 1 (3): 23 (2017)Trapdoor Computational Fuzzy Extractors., , , , and . IACR Cryptology ePrint Archive, (2014)A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon Decoding., , , and . AAECC, volume 2227 of Lecture Notes in Computer Science, page 343-352. Springer, (2001)Design and Implementation of the Ascend Secure Processor., , , , and . IEEE Trans. Dependable Sec. Comput., 16 (2): 204-216 (2019)Delay-Based Circuit Authentication and Applications., , , and . SAC, page 294-301. ACM, (2003)