Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer security by hardware-intrinsic authentication., , , and . CODES+ISSS, page 143-152. IEEE, (2015)Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks., , , , , , , and . Comput. J., 55 (4): 384-396 (2012)Computer security by hardware-intrinsic authentication., , , and . CODES+ISSS, page 143-152. IEEE, (2015)NIZKCTF: A Noninteractive Zero-Knowledge Capture-the-Flag Platform., , , , and . IEEE Security & Privacy, 16 (6): 42-51 (2018)CRPUF: A modeling-resistant delay PUF based on cylindrical reconvergence., , , and . Microprocessors and Microsystems - Embedded Hardware Design, (2018)Unbalanced Approximate Private Set Intersection., and . IACR Cryptology ePrint Archive, (2017)Two is the fastest prime., , , and . IACR Cryptology ePrint Archive, (2013)TinyTate: Identity-Based Encryption for Sensor Networks., , , , , and . IACR Cryptology ePrint Archive, (2007)Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves., , , and . IACR Cryptology ePrint Archive, (2010)Efficient implementation of elliptic curve cryptography in wireless sensors., , , and . Adv. in Math. of Comm., 4 (2): 169-187 (2010)