Search results for: Berk Sunar
International Journal of Parallel Programming > 2019 > 47 > 4 > 538-570
IEEE Transactions on Computers > 2017 > 66 > 1 > 3 - 16
Lecture Notes in Computer Science > Information Security Applications > Cryptograptanalysis > 226-238
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > SecUbiq 2006 Workshop > 372-381
IEEE Transactions on Multi-Scale Computing Systems > 2016 > 2 > 3 > 211 - 222
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Side Channels > 685-702
Lecture Notes in Computer Science > Fault Diagnosis and Tolerance in Cryptography > Fault-Resistant Arithmetic for Cryptography > 196-210
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Technical Strand—Short Papers > 273-281
Lecture Notes in Computer Science > Fault Diagnosis and Tolerance in Cryptography > Fault-Resistant Arithmetic for Cryptography > 173-184
Lecture Notes in Computer Science > Information and Communications Security > Algorithms and Implementations > 47-62
Lecture Notes in Computer Science > Arithmetic of Finite Fields > Efficient Finite Field Arithmetic > 47-61
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Side Channel Attack > 235-252
Lecture Notes in Computer Science > Computer and Information Sciences – ISCIS 2006 > Security and Cryptography > 991-1001
Lecture Notes in Computer Science > Information and Communications Security > Authentication > 33-48