Järvinen, Kimmo U.
112  Ergebnisse:
Personensuche X
?
2

A fully pipelined memoryless 17.8 Gbps AES-128 encryptor:

, In: Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays,
 
?
4

Full-Scale Mesophilic Anaerobic Co-Digestion of Municipal S..:

Rintala, Jukka A. ; Järvinen, Kimmo T.
Waste Management & Research: The Journal for a Sustainable Circular Economy.  14 (1996)  2 - p. 163-170 , 1996
 
?
5

FPGA Implementations of 256-Bit SNOW Stream Ciphers for Pos..:

Bahadori, Milad ; Jarvinen, Kimmo ; Niemi, Valtteri
IEEE Transactions on Very Large Scale Integration (VLSI) Systems.  29 (2021)  11 - p. 1943-1954 , 2021
 
?
6

Speed Reading in the Dark: Accelerating Functional Encrypti..:

Bahadori, Milad ; Järvinen, Kimmo ; Marc, Tilen.
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2021
 
?
7

Practical Privacy-Preserving Indoor Localization Based on S..:

Nieminen, Raine ; Jarvinen, Kimmo
IEEE Transactions on Mobile Computing.  20 (2021)  9 - p. 2877-2890 , 2021
 
?
9

Compact and Programmable yet High-Performance SoC Architect..:

, In: 2020 30th International Conference on Field-Programmable Logic and Applications (FPL),
Bahadori, Milad ; Jarvinen, Kimmo - p. 176-184 , 2020
 
?
10

A Programmable SoC-Based Accelerator for Privacy-Enhancing ..:

Bahadori, Milad ; Jarvinen, Kimmo
IEEE Transactions on Very Large Scale Integration (VLSI) Systems.  28 (2020)  10 - p. 2182-2195 , 2020
 
?
11

A Programmable SoC Implementation of the DGK Cryptosystem f..:

, In: 2020 23rd Euromicro Conference on Digital System Design (DSD),
Bahadori, Milad ; Jarvinen, Kimmo - p. 254-261 , 2020
 
?
12

Defeating the Downgrade Attack on Identity Privacy in 5G:

, In: Security Standardisation Research; Lecture Notes in Computer Science,
 
?
13

Modeling Privacy in WiFi Fingerprinting Indoor Localization:

, In: Provable Security; Lecture Notes in Computer Science,
Yang, Zheng ; Järvinen, Kimmo - p. 329-346 , 2018
 
?
14

Faster Privacy-Preserving Location Proximity Schemes:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
 
?
 
1-15