Search for persons
X
?
Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society ,
2
Cycle-Accurate Verification of the Cryptographic Co-Process..:
, In:
?
2024 Security for Space Systems (3S) ,
4
A Scalable and Configurable Architecture for Hardware Authe..:
, In:
?
Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society ,
5
A PUF-Based Secure Boot for RISC-V Architectures:
, In:
?
Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society ,
6
Secure Data Authentication in Space Communications by High-..:
, In:
?
Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society ,
7
Highly-Efficient Galois Counter Mode Symmetric Encryption C..:
, In:
?
Lecture Notes in Electrical Engineering; Applications in Electronics Pervading Industry, Environment and Society ,
8
On the Usage of Isomorphic Fields in Hardware AES Modules f..:
, In:
?
2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON) ,
9
On the Necessity, Security Requirements and Performance Req..:
, In:
?
2023 IEEE 3rd International Conference on Industrial Electronics for Sustainable Energy Systems (IESES) ,
10
A Novel and Robust Security Approach for Authentication, In..:
, In:
?
2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON) ,
11
Can the SHA-3 Algorithm be used for the Construction of Eff..:
, In:
?
2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON) ,
12
Implementation of a Hash-based Secure Core for Integrity an..:
, In:
?
2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON) ,
15