Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis., , , and . Signal Processing Systems, 77 (1-2): 151-167 (2014)Secure IP-Block Distribution for Hardware Devices., , , and . HOST, page 82-89. IEEE Computer Society, (2009)Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices., and . DATE, page 1-6. European Design and Automation Association, (2014)Side channels as building blocks., , , , , , and . J. Cryptographic Engineering, 2 (3): 143-159 (2012)Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem., , and . TRETS, 1 (2): 8:1-8:21 (2008)Modular Integer Arithmetic for Public Key Cryptography., and . Secure Integrated Circuits and Systems, Springer, (2010)Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives., , , and . COSADE, volume 9064 of Lecture Notes in Computer Science, page 95-107. Springer, (2015)Attacking elliptic curve cryptosystems with special-purpose hardware., , and . FPGA, page 207-215. ACM, (2007)Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge., , and . SAC, volume 11349 of Lecture Notes in Computer Science, page 479-498. Springer, (2018)High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers., , , , , , , , and . ACM Trans. Embedded Comput. Syst., 16 (4): 117:1-117:24 (2017)