Author of the publication

Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields.

. ISVLSI, page 363-364. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields.. ISVLSI, page 363-364. IEEE Computer Society, (2011)Indian thermal power plant challenges and remedies via application of modified data envelopment analysis., , , and . ITOR, 21 (6): 955-977 (2014)Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform., , and . IEEE Trans. VLSI Syst., 21 (3): 434-442 (2013)Security Analysis of Industrial Test Compression Schemes., , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 32 (12): 1966-1977 (2013)Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications., , , , , , and . J. Hardware and Systems Security, 3 (2): 103-131 (2019)Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator., , , , , , , and . CoRR, (2018)STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis., , , , and . HOST, page 11-20. IEEE, (2019)A GF(p) elliptic curve group operator resistant against side channel attacks., , , and . ACM Great Lakes Symposium on VLSI, page 53-58. ACM, (2008)High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields., , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 442-458. Springer, (2011)Towards Efficient and Automated Side Channel Evaluations at Design Time., , , , and . PROOFS@CHES, volume 7 of Kalpa Publications in Computing, page 16-31. EasyChair, (2018)