The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Abdulhadi Shoufan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss
    High-Flexibility Rekeying Processor for Key Management in Secure Multicast. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:822-829 [Conf]
  2. Abdulhadi Shoufan, Sorin A. Huss, Murtuza Cutleriwala
    A Novel Batch Rekeying Processor Architecture for Secure Multicast Key Management. [Citation Graph (0, 0)][DBLP]
    HiPEAC, 2005, pp:169-183 [Conf]

  3. A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. [Citation Graph (, )][DBLP]


  4. Compact AES-based Architecture for Symmetric Encryption, Hash Function, and Random Number Generation. [Citation Graph (, )][DBLP]


  5. A Timing Attack against Patterson Algorithm in the McEliece PKC. [Citation Graph (, )][DBLP]


  6. An efficient reliability evaluation approach for system-level design of embedded systems. [Citation Graph (, )][DBLP]


  7. Schlüsselverwaltung im Sicheren Multicast. [Citation Graph (, )][DBLP]


  8. Reliable Performance Evaluation of Rekeying Algorithms in Secure Multicast. [Citation Graph (, )][DBLP]


  9. A Demonstrator for Beamforming in C2X Communication. [Citation Graph (, )][DBLP]


  10. Enhancing Security and Privacy in C2X Communication by Radiation Pattern Control. [Citation Graph (, )][DBLP]


  11. Reconfigurable Computing Education in Computer Science. [Citation Graph (, )][DBLP]


  12. An FPGA Accelerator for Hash Tree Generation in the Merkle Signature Scheme. [Citation Graph (, )][DBLP]


  13. A platform for visualizing digital circuit synthesis with VHDL. [Citation Graph (, )][DBLP]


  14. Side Channels in the McEliece PKC. [Citation Graph (, )][DBLP]


  15. A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures. [Citation Graph (, )][DBLP]


  16. Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002