Search results for: Shay Gueron
Journal of Cryptographic Engineering > 2019 > 9 > 4 > 341-357
Journal of Cryptology > 2018 > 31 > 3 > 798-844
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2017 > 25 > 12 > 3268 - 3280
IEEE Security & Privacy > 2017 > 15 > 6 > 61 - 67
Journal of Cryptology > 2018 > 31 > 1 > 162-171
IEEE Security & Privacy > 2016 > 14 > 6 > 54 - 62
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Finite Field and Modular Arithmetic I > 46-56
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Hash Functions I > 162-178
Lecture Notes in Computer Science > Fault Diagnosis and Tolerance in Cryptography > Protection of Public Key Systems > 80-87
Lecture Notes in Computer Science > Fault Diagnosis and Tolerance in Cryptography > Attacks on Public Key Systems > 1-12
IFIP — The International Federation for Information Processing > Emerging Challenges for Security, Privacy and Trust > Trusted Computing > 143-151