Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields.. ISVLSI, page 363-364. IEEE Computer Society, (2011)Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform., , and . IEEE Trans. VLSI Syst., 21 (3): 434-442 (2013)Indian thermal power plant challenges and remedies via application of modified data envelopment analysis., , , and . ITOR, 21 (6): 955-977 (2014)Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications., , , , , , and . J. Hardware and Systems Security, 3 (2): 103-131 (2019)Security Analysis of Industrial Test Compression Schemes., , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 32 (12): 1966-1977 (2013)Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator., , , , , , , and . CoRR, (2018)STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis., , , , and . HOST, page 11-20. IEEE, (2019)High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields., , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 442-458. Springer, (2011)Towards Efficient and Automated Side Channel Evaluations at Design Time., , , , and . PROOFS@CHES, volume 7 of Kalpa Publications in Computing, page 16-31. EasyChair, (2018)Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks., , , and . VDAT, volume 7373 of Lecture Notes in Computer Science, page 370-372. Springer, (2012)