M. Anwar Hasan
Orcid: 0000-0003-4103-7945Affiliations:
- University of Waterloo, Canada
According to our database1,
M. Anwar Hasan
authored at least 115 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Information Security - 27th International Conference, 2024
ChronoCloak: An Integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination.
Proceedings of the Information Security - 27th International Conference, 2024
TrustBandit: Optimizing Client Selection for Robust Federated Learning Against Poisoning Attacks.
Proceedings of the IEEE INFOCOM 2024, 2024
2023
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
2022
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
2021
Peer-to-Peer Netw. Appl., 2021
Peer-to-Peer Netw. Appl., 2021
IEEE Access, 2021
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021
2020
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
2018
J. Signal Process. Syst., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms.
Inf. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Efficient Reductions in Cyclotomic Rings - Application to Ring-LWE Based FHE Schemes.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Finite Fields Their Appl., 2015
Exp-HE: a family of fast exponentiation algorithms resistant to SPA, fault, and combined attacks.
Proceedings of the 2015 International Conference on Embedded Software, 2015
2014
Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based on Block Recombination.
IEEE Trans. Computers, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds.
IEEE Trans. Cloud Comput., 2013
IEEE Trans. Computers, 2013
Improved Three-Way Split Formulas for Binary Polynomial and Toeplitz Matrix Vector Products.
IEEE Trans. Computers, 2013
IEEE Trans. Computers, 2013
IACR Cryptol. ePrint Arch., 2013
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis.
Proceedings of the SIGPLAN/SIGBED Conference on Languages, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
Binary extension field arithmetic for hardware implementations.
Proceedings of the Handbook of Finite Fields., 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
IEEE Trans. Very Large Scale Integr. Syst., 2012
Block Recombination Approach for Subquadratic Space Complexity Binary Field Multiplication Based on Toeplitz Matrix-Vector Product.
IEEE Trans. Computers, 2012
Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over $\mathbb{F}_{2^{1223}}$.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012
2011
Low Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation.
IEEE Trans. Computers, 2011
J. Cryptogr. Eng., 2011
J. Cryptogr. Eng., 2011
J. Cryptogr. Eng., 2011
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
2010
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IEEE Trans. Dependable Secur. Comput., 2009
Concurrent Error Detection in Finite-Field Arithmetic Operations Using Pipelined and Systolic Architectures.
IEEE Trans. Computers, 2009
Alternative to the karatsuba algorithm for software implementations of GF(2<sub>n</sub>) multiplications.
IET Inf. Secur., 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Subquadratic Space Complexity Multiplier for a Class of Binary Fields Using Toeplitz Matrix Approach.
Proceedings of the 19th IEEE Symposium on Computer Arithmetic, 2009
2008
IEEE Trans. Computers, 2008
Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation.
Proceedings of the Arithmetic of Finite Fields, 2nd International Workshop, 2008
2007
IEEE Trans. Very Large Scale Integr. Syst., 2007
Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases.
IEEE Trans. Computers, 2007
IEEE Trans. Computers, 2007
A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields.
IEEE Trans. Computers, 2007
IEEE Trans. Computers, 2007
Detecting errors in a polynomial basis multiplier using multiple parity bits for both inputs.
Proceedings of the 25th International Conference on Computer Design, 2007
Proceedings of the IEEE International Conference on Application-Specific Systems, 2007
Montgomery Reduction Algorithm for Modular Multiplication Using Low-Weight Polynomial Form Integers.
Proceedings of the 18th IEEE Symposium on Computer Arithmetic (ARITH-18 2007), 2007
Proceedings of the 18th IEEE Symposium on Computer Arithmetic (ARITH-18 2007), 2007
2006
IEEE Trans. Circuits Syst. I Regul. Pap., 2006
IEEE Trans. Computers, 2006
Relationship between GF(2<sup>m</sup>) Montgomery and Shifted Polynomial Basis Multiplication Algorithms.
IEEE Trans. Computers, 2006
2005
IEEE Trans. Computers, 2005
A Class of Unidirectional Bit Serial Systolic Architectures for Multiplicative Inversion and Division over GF(2<sup>m</sup>).
IEEE Trans. Computers, 2005
Concurrent Error Detection of Polynomial Basis Multiplication over Extension Fields using a Multiple-bit Parity Scheme.
Proceedings of the 20th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2005), 2005
2004
ACM Trans. Embed. Comput. Syst., 2004
ACM Trans. Embed. Comput. Syst., 2004
Low Complexity Bit Parallel Architectures for Polynomial Basis Multiplication over GF(2^{m}).
IEEE Trans. Computers, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
2003
IEEE Trans. Computers, 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Proceedings of the 16th IEEE Symposium on Computer Arithmetic (Arith-16 2003), 2003
A Unidirectional Bit Serial Systolic Architecture for Double-Basis Division over GF(2m).
Proceedings of the 16th IEEE Symposium on Computer Arithmetic (Arith-16 2003), 2003
2002
A New Construction of Massey-Omura Parallel Multiplier over <i>GF</i>(2<sup><i>m</i></sup>).
IEEE Trans. Computers, 2002
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2001
IEEE Trans. Very Large Scale Integr. Syst., 2001
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2001
Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Curve Cryptosystems.
IEEE Trans. Computers, 2001
Proceedings of the 15th IEEE Symposium on Computer Arithmetic (Arith-15 2001), 2001
2000
VLSI Algorithms, Architectures, and Implementation of a Versatile GF(2<sup>m</sup>) Processor.
IEEE Trans. Computers, 2000
Look-Up Table-Based Large Finite Field Multiplication in Memory Constrained Cryptosystems.
IEEE Trans. Computers, 2000
Proceedings of the Progress in Cryptology, 2000
1999
IEEE Trans. Computers, 1999
Proceedings of the 9th Great Lakes Symposium on VLSI (GLS-VLSI '99), 1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
IEEE Trans. Computers, 1998
IEEE Trans. Computers, 1998
IEEE Trans. Computers, 1998
Proceedings of the 8th Great Lakes Symposium on VLSI (GLS-VLSI '98), 1998
1997
1995
IEEE Trans. Computers, 1995
1994
IEEE Trans. Commun., 1994
1993
IEEE Trans. Computers, 1993
1992
Modular Construction of Low Complexity Parallel Multipliers for a Class of Finite Fields GF(2^m).
IEEE Trans. Computers, 1992
IEEE Trans. Computers, 1992