Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories More Books Like This

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography
2021
Next Generation Arithmetic Next Generation Arithmetic
2022
Arithmetic Optimization Techniques for Hardware and Software Design Arithmetic Optimization Techniques for Hardware and Software Design
2010
Progress in Cryptology – LATINCRYPT 2019 Progress in Cryptology – LATINCRYPT 2019
2019
Progress in Cryptology – INDOCRYPT 2017 Progress in Cryptology – INDOCRYPT 2017
2017
Numerical Validation in Current Hardware Architectures Numerical Validation in Current Hardware Architectures
2009
Cryptographic Hardware and Embedded Systems – CHES 2008 Cryptographic Hardware and Embedded Systems – CHES 2008
2008
Progress in Cryptology - AFRICACRYPT 2022 Progress in Cryptology - AFRICACRYPT 2022
2022
Selected Areas in Cryptography Selected Areas in Cryptography
2021
Stream Ciphers Stream Ciphers
2013
Selected Areas in Cryptography – SAC 2016 Selected Areas in Cryptography – SAC 2016
2017
Selected Areas in Cryptography -- SAC 2013 Selected Areas in Cryptography -- SAC 2013
2014
Code-Based Cryptography Code-Based Cryptography
2023
Selected Areas in Cryptography Selected Areas in Cryptography
2009
Parallel Computing Parallel Computing
2020