Author of the publication

FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields.

, , , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting., , , , , , and . ICL-GNSS, page 1-6. IEEE, (2018)Fast Inversion in $GF(2^m)$ with Normal Basis Using Hybrid-Double Multipliers., , and . IEEE Trans. Computers, 63 (4): 1041-1047 (2014)Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations., and . CARDIS, volume 10146 of Lecture Notes in Computer Science, page 137-155. Springer, (2016)A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates., , , , and . AFRICACRYPT, volume 9646 of Lecture Notes in Computer Science, page 63-83. Springer, (2016)Another Look at Inversions over Binary Fields., and . IEEE Symposium on Computer Arithmetic, page 211-218. IEEE Computer Society, (2013)PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing., , , , , , and . EuroS&P, page 448-463. IEEE, (2019)Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic Applications., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 34 (3): 332-340 (2015)A Programmable SoC-Based Accelerator for Privacy-Enhancing Technologies and Functional Encryption., and . IEEE Trans. Very Large Scale Integr. Syst., 28 (10): 2182-2195 (2020)A Generalization of Addition Chains and Fast Inversions in Binary Fields., , and . IEEE Trans. Computers, 64 (9): 2421-2432 (2015)Arithmetic of $$$$ τ -adic expansions for lightweight Koblitz curve cryptography., , and . J. Cryptographic Engineering, 8 (4): 285-300 (2018)