209 results on '"Lee, Wai-Kong"'
Search Results
2. ARMing-Sword: Scabbard on ARM
3. ARMing-Sword: Scabbard on ARM
4. Grover on SM3
5. SPEEDY on Cortex–M3: Efficient Software Implementation of SPEEDY on ARM Cortex–M3
6. Variant of Niederreiter-Based Signature Scheme for Blockchain Technology
7. ARMed Frodo : FrodoKEM on 64-Bit ARMv8 Processors
8. Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers
9. No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM Platforms
10. cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications
11. Grover on SM3
12. Variant of Niederreiter-Based Signature Scheme for Blockchain Technology
13. SPEEDY on Cortex–M3: Efficient Software Implementation of SPEEDY on ARM Cortex–M3
14. Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
15. Hierarchical Attention Networks for Different Types of Documents with Smaller Size of Datasets
16. Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme
17. An energy efficient FPGA partial reconfiguration based micro-architectural technique for IoT applications
18. Speed Record of AES-CTR and AES-ECB Bit-Sliced Implementation on GPUs
19. High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka
20. Efficient TMVP-Based Polynomial Convolution on GPU for Post-Quantum Cryptography Targeting IoT Applications
21. Accelerating number theoretic transform in GPU platform for fully homomorphic encryption
22. Speeding up the Montgomery Exponentiation with CMM-SDR Over GPU with Maxwell and Pascal Architecture
23. Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification
24. Structure of Security Proof
25. Modern Cryptography with Proof Techniques and Applications
26. Digital Signature
27. Tight Reduction
28. Introduction to Lattice
29. Code-Based Cryptography
30. Identity-Based Encryption (4)
31. Lattice-Based Cryptography
32. Private-Key Encryption (3)
33. Attribute-Based Encryption
34. Hash Function
35. Identity-Based Encryption (3)
36. Predicate Encryption and Functional Encryption
37. Private-Key Encryption (2)
38. Secret Sharing
39. Introduction to Cryptography
40. Selected Algorithms
41. Identity-Based Encryption (2)
42. Message Authentication Code
43. Introduction to Linear Codes
44. Introduction to Number Theory
45. Broadcast Encryption
46. Private-Key Encryption (1)
47. Transformation Technique
48. Public-Key Encryption
49. Identity-Based Encryption (1)
50. Hierarchical Identity-Based Encryption
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.