Author of the publication

Forward-Secure Content Distribution to Reconfigurable Hardware.

, , , , and . ReConFig, page 450-455. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks., and . AHS, page 101-108. IEEE Computer Society, (2008)Global optimization approach for architectural synthesis., and . IEEE Trans. on CAD of Integrated Circuits and Systems, 12 (9): 1266-1278 (1993)Counteracting power analysis attack using Static Single-ended Logic., , and . ISCAS, page 721-724. IEEE, (2011)A Sliding Window Phase-Only Correlation Method for Side-Channel Alignment in a Smartphone., and . ACM Trans. Embedded Comput. Syst., 14 (4): 80:1-80:22 (2015)Design of secure cryptography against the threat of power-attacks in DSP-embedded processors.. ACM Trans. Embedded Comput. Syst., 3 (1): 92-113 (2004)Methodology for EM Fault Injection: Charge-based Fault Model., and . DATE, page 256-259. IEEE, (2019)A Propagation Rate Based Splitting Heuristic for Divide-and-Conquer Solvers., , , , , , and . SAT, volume 10491 of Lecture Notes in Computer Science, page 251-260. Springer, (2017)Efficient Techniques for High-Speed Elliptic Curve Cryptography., and . CHES, volume 6225 of Lecture Notes in Computer Science, page 80-94. Springer, (2010)EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA., , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 250-264. Springer, (2005)Simultaneous Scheduling and Allocation for Cost Constrained Optimal Architectural Synthesis., and . DAC, page 2-7. ACM, (1991)