Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories More Books Like This

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography
2021
Next Generation Arithmetic Next Generation Arithmetic
2022
Selected Areas in Cryptography Selected Areas in Cryptography
2007
Arithmetic Optimization Techniques for Hardware and Software Design Arithmetic Optimization Techniques for Hardware and Software Design
2010
Progress in Cryptology – LATINCRYPT 2019 Progress in Cryptology – LATINCRYPT 2019
2019
Progress in Cryptology – INDOCRYPT 2017 Progress in Cryptology – INDOCRYPT 2017
2017
Numerical Validation in Current Hardware Architectures Numerical Validation in Current Hardware Architectures
2009
Cryptographic Hardware and Embedded Systems – CHES 2008 Cryptographic Hardware and Embedded Systems – CHES 2008
2008
Progress in Cryptology - AFRICACRYPT 2022 Progress in Cryptology - AFRICACRYPT 2022
2022
Selected Areas in Cryptography Selected Areas in Cryptography
2021
Stream Ciphers Stream Ciphers
2013
Selected Areas in Cryptography – SAC 2016 Selected Areas in Cryptography – SAC 2016
2017
Selected Areas in Cryptography -- SAC 2013 Selected Areas in Cryptography -- SAC 2013
2014
Code-Based Cryptography Code-Based Cryptography
2023
Selected Areas in Cryptography Selected Areas in Cryptography
2009