Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VLSI Implementations of the Cryptographic Hash Functions MD6 and ïrRUPT., , , , and . ISCAS, page 2914-2917. IEEE, (2009)Quark: A Lightweight Hash., , , and . CHES, volume 6225 of Lecture Notes in Computer Science, page 1-15. Springer, (2010)Developing a Hardware Evaluation Method for SHA-3 Candidates., , , , , and . CHES, volume 6225 of Lecture Notes in Computer Science, page 248-263. Springer, (2010)Quark: A Lightweight Hash., , , and . J. Cryptology, 26 (2): 313-339 (2013)A Security-Enhanced UHF RFID Tag Chip., , , , and . DSD, page 705-712. IEEE Computer Society, (2013)Hardware evaluation of the stream cipher-based hash functions RadioGatún and irRUPT., , , and . DATE, page 646-651. IEEE, (2009)VLSI Characterization of the Cryptographic Hash Function BLAKE., , , and . IEEE Trans. VLSI Syst., 19 (10): 1746-1754 (2011)Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128., , , , and . IACR Cryptology ePrint Archive, (2009)The Hash Function BLAKE, , , and . Information Security and Cryptography Springer, (2014)VLSI circuits for cryptographic authentication.. ETH Zurich, (2011)