The SCEAS System
Navigation Menu

Search the dblp DataBase


Jorge Guajardo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Thomas J. Wollinger, Min Wang, Jorge Guajardo, Christof Paar
    How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:94-105 [Conf]
  2. Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Christof Paar
    Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:351-365 [Conf]
  3. Jorge Guajardo, Christof Paar
    Efficient Algorithms for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:342-356 [Conf]
  4. Guido Bertoni, Jorge Guajardo, Sandeep S. Kumar, Gerardo Orlando, Christof Paar, Thomas J. Wollinger
    Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:158-175 [Conf]
  5. Guido Bertoni, Jorge Guajardo, Gerardo Orlando
    Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:349-362 [Conf]
  6. Jorge Guajardo, Rainer Blümel, Uwe Krieger, Christof Paar
    Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:365-382 [Conf]
  7. Ari Juels, Jorge Guajardo
    RSA Key Generation with Verifiable Randomness. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:357-374 [Conf]
  8. Johannes Blömer, Jorge Guajardo, Volker Krummel
    Provably Secure Masking of AES. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:69-83 [Conf]
  9. Jorge Guajardo, Christof Paar
    Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:25, n:2, pp:207-216 [Journal]
  10. Thomas J. Wollinger, Jorge Guajardo, Christof Paar
    Security on FPGAs: State-of-the-art implementations and attacks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:534-574 [Journal]
  11. Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, Pim Tuyls
    FPGA Intrinsic PUFs and Their Use for IP Protection. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:63-80 [Conf]
  12. Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls
    ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:187-202 [Conf]

  13. Efficient Helper Data Key Extractor on FPGAs. [Citation Graph (, )][DBLP]

  14. A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem. [Citation Graph (, )][DBLP]

  15. Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis. [Citation Graph (, )][DBLP]

  16. Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection. [Citation Graph (, )][DBLP]

  17. Brand and IP protection with physical unclonable functions. [Citation Graph (, )][DBLP]

  18. Public-Key Cryptography for RFID-Tags. [Citation Graph (, )][DBLP]

  19. Privacy-Preserving Face Recognition. [Citation Graph (, )][DBLP]

  20. Physical Unclonable Functions and Their Applications to Vehicle System Security. [Citation Graph (, )][DBLP]

  21. The Butterfly PUF: Protecting IP on every FPGA. [Citation Graph (, )][DBLP]

  22. Secure IP-Block Distribution for Hardware Devices. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002