- Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers.
- Studying OpenCL-based Number Theoretic Transform for heterogeneous platforms.
- Exploring the FPGA Implementations of the LBlock, Piccolo, Twine, and Klein Ciphers.
- Profiling Dilithium Digital Signature Traces for Correlation Differential Side Channel Attacks.
- Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices.
- Lightweight Efficient Simeck32/64 Crypto-Core Designs and Implementations, for IoT Security.
- Revisiting Rowhammer Attacks in Embedded Systems.
- Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures.
- Trusted hardware sensors for anomaly detection in critical infrastructure systems.
- A flexible leakage trace collection setup for arbitrary cryptographic IP cores.
- A Design Strategy for Digit Serial Multiplier Based Binary Edwards Curve Scalar Multiplier Architectures.
- Hardware Security for Critical Infrastructures - The CIPSEC Project Approach.
- Building softwarized mobile infrastructures with ForCES.
- Scalable playback rate control in P2P live streaming systems.
- Network Programmability With ForCES.
- Comparing design approaches for elliptic curve point multiplication over GF(2k) with polynomial basis representation.
- Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems.
- Software-Defined Networking (SDN): Layers and Architecture Terminology.
- Affine Coordinate Binary Edwards Curve Scalar Multiplier with Side Channel Attack Resistance.
- Towards a Network Abstraction Model for SDN.
- Scalable control of bandwidth resources in P2P live streaming.
- ForCES Applicability to SDN-Enhanced NFV.
- Designing and Evaluating High Speed Elliptic Curve Point Multipliers.
- Software-Defined Networking: Experimenting with the Control to Forwarding Plane Interface.
- VLSI Design and Implementation of Homophonic Security System.
- Protecting CRT RSA against Fault and Power Side Channel Attacks.
- CRT RSA Hardware Architecture with Fault and Simple Power Attack Countermeasures.
- LiquidStream - network dependent dynamic P2P live streaming.
- VITAL++, a new communication paradigm: embedding P2P technology in next generation networks.
- Forwarding and Control Element Separation (ForCES) Implementation Experience.