default search action
Elena Trichina
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j4]Alexander Kolesnikov, Elena Trichina, Tuomo Kauranne:
Estimating the number of clusters in a numerical data set via quantization error modeling. Pattern Recognit. 48(3): 941-952 (2015) - 2012
- [c39]Alexander Kolesnikov, Elena Trichina:
Determining the Number of Clusters with Rate-Distortion Curve Modeling. ICIAR (1) 2012: 43-50 - [p2]Alessandro Barenghi, Elena Trichina:
Fault Attacks on Stream Ciphers. Fault Analysis in Cryptography 2012: 239-255 - 2010
- [c38]Elena Trichina, Roman Korkikyan:
Multi Fault Laser Attacks on Protected CRT-RSA. FDTC 2010: 75-86 - [p1]Helena Handschuh, Elena Trichina:
From Secure Memories to Smart Card Security. Secure Integrated Circuits and Systems 2010: 215-234 - [i4]Arnaud Boscher, Helena Handschuh, Elena Trichina:
Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions. IACR Cryptol. ePrint Arch. 2010: 38 (2010)
2000 – 2009
- 2009
- [c37]Arnaud Boscher, Helena Handschuh, Elena Trichina:
Blinded Fault Resistant Exponentiation Revisited. FDTC 2009: 3-9 - 2008
- [j3]Marko Hassinen, Konstantin Hyppönen, Elena Trichina:
Utilizing national public-key infrastructure in mobile payment systems. Electron. Commer. Res. Appl. 7(2): 214-231 (2008) - [c36]Konstantin Hyppönen, Marko Hassinen, Elena Trichina:
Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool. ISSE 2008: 208-217 - [c35]Helena Handschuh, Elena Trichina:
Securing Flash Technology: How Does It Look From Inside? ISSE 2008: 380-389 - [c34]Konstantin Hyppönen, Marko Hassinen, Elena Trichina:
Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI. TRUST 2008: 107-118 - [c33]Konstantin Hyppönen, Marko Hassinen, Elena Trichina:
Combining Biometric Authentication with Privacy-Enhancing Technologies. TRUST 2008: 155-165 - 2007
- [c32]Helena Handschuh, Elena Trichina:
Securing Flash Technology. FDTC 2007: 3-17 - [c31]Helena Handschuh, Elena Trichina:
High Density Smart Cards: New Security Challenges and Applications. ISSE 2007: 251-259 - [c30]Elena Trichina, Konstantin Hyppönen, Marko Hassinen:
SIM-enabled Open Mobile Payment System Based on Nation-wide PKI. ISSE 2007: 355-366 - 2006
- [c29]Helena Handschuh, Elena Trichina:
Hardware Security Features for Secure Embedded Devices. ISSE 2006: 38-44 - 2004
- [c28]Elena Trichina, Tymur A. Korkishko, Kyung-Hee Lee:
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results. AES Conference 2004: 113-127 - [c27]Elena Trichina, Tymur A. Korkishko:
Secure AES Hardware Module for Resource Constrained Devices. ESAS 2004: 215-230 - [c26]Elena Trichina, Lesya M. Korkishko:
Secure and Efficient AES Software Implementation for Smart Cards. WISA 2004: 425-439 - [i3]Elena Trichina, Lesya M. Korkishko:
Secure and Efficient AES Software Implementation for Smart Caards. IACR Cryptol. ePrint Arch. 2004: 149 (2004) - 2003
- [j2]Alex Davidovic, James R. Warren, Elena Trichina:
Learning benefits of structural example-based adaptive tutoring systems. IEEE Trans. Educ. 46(2): 241-251 (2003) - [c25]Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine:
Trading-Off Type-Inference Memory Complexity against Communication. ICICS 2003: 60-71 - [i2]Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine:
Trading-Off Type-Inference Memory Complexity Against Communication. IACR Cryptol. ePrint Arch. 2003: 140 (2003) - [i1]Elena Trichina:
Combinational Logic Design for AES SubByte Transformation on Masked Data. IACR Cryptol. ePrint Arch. 2003: 236 (2003) - 2002
- [c24]Elena Trichina, Antonio Bellezza:
Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. CHES 2002: 98-113 - [c23]Elena Trichina, Domenico De Seta, Lucia Germani:
Simplified Adaptive Multiplicative Masking for AES. CHES 2002: 187-197 - [c22]David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina:
Reducing the Memory Complexity of Type-Inference Algorithms. ICICS 2002: 109-121 - [c21]Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen:
Applet Verification Strategiesfor RAM-Constrained Devices. ICISC 2002: 118-137 - 2001
- [j1]Elena Trichina, Marco Bucci, Domenico De Seta, Raimondo Luzzi:
Supplemental Cryptographic Hardware for Smart Cards. IEEE Micro 21(6): 26-35 (2001) - [c20]Alexander Tiountchik, Elena Trichina:
Modular Exponentiation on Fine-Grained FPGA. CT-RSA 2001: 223-234 - [c19]Elena Trichina, Alexander Tiountchik:
Scalable Algorithm for Montgomery Multiplication and Its Implementation on the Coarse-Grain Reconfigurable Chip. CT-RSA 2001: 235-249 - 2000
- [c18]Alex Davidovic, James R. Warren, Elena Trichina:
Structural example-based adaptive tutoring system (poster session) (SEATS). ITiCSE 2000: 187 - [c17]Alexander Tiountchik, Elena Trichina:
Modular Exponentiation on Fine-Grained FPGA. SBCCI 2000: 139-143
1990 – 1999
- 1999
- [c16]Alexander Tiountchik, Elena Trichina:
RSA Acceleration with Field Programmable Gate Arrays. ACISP 1999: 164-176 - [c15]Elena Trichina:
Compositional Style of Programming FPGAs. Ershov Memorial Conference 1999: 257-264 - [c14]Alexander Tiountchik, Elena Trichina:
FPGA Implementation of Modular Exponentiation. IPPS/SPDP Workshops 1999: 712-715 - [c13]Elena Trichina:
Didactic instructional tool for topics in computer science. ITiCSE 1999: 95-98 - 1998
- [c12]Alex Davidovic, Elena Trichina:
Open learning environment and instruction system (OLEIS). ITiCSE 1998: 69-73 - [c11]Joanne E. Zucco, Bruce H. Thomas, Elena Trichina:
Interactive animation for visualisation of mapping of parallel programs into parallel processors. KES (3) 1998: 386-395 - 1997
- [c10]Elena Trichina, Juha Oinonen:
Visualization of Data Dependency Analysis in Parallel Program Design. Euro-PDS 1997: 87-92 - [c9]Elena Trichina, Juha Oinonen:
Parallel program design in visual environment. HiPC 1997: 198-203 - [c8]Elena Trichina, Juha Oinonen:
3D Visual Tool Supporting Derivation of Parallel Programs for MIMD Systems. PaCT 1997: 268-282 - [c7]Elena Trichina:
3D Visual Tool supporting Derivation of Distributed-Memory Massively Parallel Programs by Stepwise Transformations. PARCO 1997: 625-632 - 1996
- [c6]Elena Trichina:
Derivation of Explicitly Parallel Code from Declarative Program by Transformations. Ershov Memorial Conference 1996: 178-190 - [c5]Elena Trichina, Juha Oinonen:
Visualization of Configuration Description in Parallel Programming Environment. HPCN Europe 1996: 1023-1024 - 1995
- [c4]Elena Trichina:
From functional equations to Occam programs: systolizing compilation. PACT 1995: 310-314 - 1994
- [c3]Elena Trichina:
Development of Occam Programs by Stepwise Transformation of Affine Recurrence Equations. Parcella 1994: 151-160 - 1993
- [c2]Elena Trichina:
An intelligent programming environment for multiprocessor systems. ANNES 1993: 183-186 - [c1]Elena Trichina:
An Application of Equational Programming with Streams to the Development of Efficient Programs for MIMD Computers. PARCO 1993: 659-664
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-15 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint