Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Finding a needle in a haystack - A comparative study of IPv6 scanning methods.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019
Generalised Mersenne numbers revisited.
Math. Comput., 2013
Compiler Assisted Masking.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Automatic Insertion of DPA Countermeasures.
IACR Cryptol. ePrint Arch., 2011
Type Checking Cryptography Implementations.
Proceedings of the Fundamentals of Software Engineering - 4th IPM International Conference, 2011
Bridging the gap between symbolic and efficient AES implementations.
Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2010
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography.
J. Cryptol., 2009
Proceedings of the 2009 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, 2009
Executing Modular Exponentiation on a Graphics Accelerator.
IACR Cryptol. ePrint Arch., 2007
Compiler Assisted Elliptic Curve Cryptography.
IACR Cryptol. ePrint Arch., 2007
Toward Acceleration of RSA Using 3D Graphics Hardware.
Proceedings of the Cryptography and Coding, 2007
A 10mW Wearable Positioning System.
Proceedings of the Tenth IEEE International Symposium on Wearable Computers (ISWC 2006), 2006
Program transformation of embedded systems.
PhD thesis, 2005
Efficient Code Generation for a Domain Specific Language.
Proceedings of the Generative Programming and Component Engineering, 2005
Certification of Public Keys within an Identity Based System.
Proceedings of the Information Security, 5th International Conference, 2002
Things aren't what they seem to be: innovation through technology inspiration.
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 4th Conference on Designing Interactive Systems: Processes, 2002