Author of the publication

Multifunction Residue Architectures for Cryptography.

, and . IEEE Trans. on Circuits and Systems, 61-I (4): 1156-1169 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GF(2n) Montgomery multiplication using Polynomial Residue Arithmetic., , and . ISCAS, page 3033-3036. IEEE, (2012)An RNS barrett modular multiplication architecture., and . ISCAS, page 2229-2232. IEEE, (2014)Multifunction Residue Architectures for Cryptography., and . IEEE Trans. on Circuits and Systems, 61-I (4): 1156-1169 (2014)Hardware-fault attack handling in RNS-based Montgomery multipliers., and . ISCAS, page 3042-3045. IEEE, (2013)Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach., , , and . WCNC, page 1-8. IEEE, (2019)An RNS modular multiplication algorithm., and . ICECS, page 958-961. IEEE, (2013)Efficient RNS Implementation of Elliptic Curve Point Multiplication Over $GF(p)$., , , , and . IEEE Trans. VLSI Syst., 21 (8): 1545-1549 (2013)Elliptic Curve Point Multiplication in GF(2n) using Polynomial Residue Arithmetic., , , and . ICECS, page 980-983. IEEE, (2009)A High-Speed FPGA Implementation of an RSD-Based ECC Processor., , , , and . IEEE Trans. VLSI Syst., 24 (1): 151-164 (2016)An RNS Implementation of an Fp Elliptic Curve Point Multiplier., , , , and . IEEE Trans. on Circuits and Systems, 56-I (6): 1202-1213 (2009)