From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Elliptic and Hyperelliptic Curves: a Practical Security Analysis., , и . IACR Cryptology ePrint Archive, (2013)Microprocessor fault-tolerance via on-the-fly partial reconfiguration., , , и . ETS, стр. 201-206. IEEE Computer Society, (2010)Buffer overflow vulnerabilities in CUDA: a preliminary analysis.. CoRR, (2015)Cofactorization on Graphics Processing Units., , , и . CHES, том 8731 из Lecture Notes in Computer Science, стр. 335-352. Springer, (2014)An efficient many-core architecture for Elliptic Curve Cryptography security assessment., , , и . FPL, стр. 1-6. IEEE, (2015)FourCastNet: Accelerating Global High-Resolution Weather Forecasting using Adaptive Fourier Neural Operators., , , , , , , , и . CoRR, (2022)FourCastNet: Accelerating Global High-Resolution Weather Forecasting Using Adaptive Fourier Neural Operators., , , , , , , , и . PASC, стр. 13:1-13:11. ACM, (2023)Elliptic and Hyperelliptic Curves: A Practical Security Analysis., , и . Public Key Cryptography, том 8383 из Lecture Notes in Computer Science, стр. 203-220. Springer, (2014)FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields., , , и . IACR Cryptology ePrint Archive, (2016)Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields., , , и . CHES, том 9813 из Lecture Notes in Computer Science, стр. 517-537. Springer, (2016)