<?xml version="1.0"?>
<dblpperson name="Kimmo J&#228;rvinen 0001" pid="93/54" n="71">
<person key="homepages/93/54" mdate="2025-06-07">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<note type="affiliation">University of Helsinki, Finland</note>
<note label="since 2016" type="affiliation">KU Leuven, Belgium</note>
<note label="2008 - 2014" type="affiliation">Aalto University, Espoo, Finland</note>
<note label="PhD 2008" type="affiliation">Helsinki University of Technology (TKK), Espoo, Finland</note>
<url>http://users.ics.aalto.fi/~kjarvine/</url>
<url>https://scholar.google.com/citations?user=_F-xujQAAAAJ</url>
<url>https://orcid.org/0000-0001-8012-2881</url>
<url>https://www.researchgate.net/profile/Kimmo_Jaervinen</url>
</person>
<homonyms n="2">
<h f="j/J=auml=rvinen:Kimmo"><name>Kimmo J&#228;rvinen</name>
</h>
<h f="j/J=auml=rvinen_0002:Kimmo"><person key="homepages/93/54-2" mdate="2016-01-04">
<author pid="93/54-2">Kimmo J&#228;rvinen 0002</author>
<note type="affiliation">University of Helsinki, Finland</note>
</person>
</h>
</homonyms>
<r><article key="journals/tches/BahadoriJMS21" mdate="2023-08-28">
<author orcid="0000-0002-2964-2504" pid="174/8359">Milad Bahadori</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="140/7360">Tilen Marc</author>
<author pid="40/10256">Miha Stopar</author>
<title>Speed Reading in the Dark: Accelerating Functional Encryption for Quadratic Functions with Reprogrammable Hardware.</title>
<pages>1-27</pages>
<year>2021</year>
<volume>2021</volume>
<journal>IACR Trans. Cryptogr. Hardw. Embed. Syst.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.46586/tches.v2021.i3.1-27</ee>
<ee>https://www.wikidata.org/entity/Q114843844</ee>
<url>db/journals/tches/tches2021.html#BahadoriJMS21</url>
</article>
</r>
<r><article key="journals/tmc/NieminenJ21" mdate="2021-12-15">
<author orcid="0000-0002-6667-3641" pid="299/0033">Raine Nieminen</author>
<author orcid="0000-0001-8012-2881" pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>Practical Privacy-Preserving Indoor Localization Based on Secure Two-Party Computation.</title>
<pages>2877-2890</pages>
<year>2021</year>
<volume>20</volume>
<journal>IEEE Trans. Mob. Comput.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TMC.2020.2990871</ee>
<url>db/journals/tmc/tmc20.html#NieminenJ21</url>
</article>
</r>
<r><article key="journals/tvlsi/BahadoriJN21" mdate="2023-08-28">
<author orcid="0000-0002-2964-2504" pid="174/8359">Milad Bahadori</author>
<author orcid="0000-0001-8012-2881" pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="17/1565">Valtteri Niemi</author>
<title>FPGA Implementations of 256-Bit SNOW Stream Ciphers for Postquantum Mobile Security.</title>
<pages>1943-1954</pages>
<year>2021</year>
<volume>29</volume>
<journal>IEEE Trans. Very Large Scale Integr. Syst.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TVLSI.2021.3108430</ee>
<ee>https://www.wikidata.org/entity/Q121776874</ee>
<url>db/journals/tvlsi/tvlsi29.html#BahadoriJN21</url>
</article>
</r>
<r><article key="journals/iet-ifs/JarvinenKSTY20" mdate="2025-01-19">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="150/0067">&#193;gnes Kiss</author>
<author orcid="0000-0001-8090-1316" pid="06/3872-3">Thomas Schneider 0003</author>
<author pid="213/7432">Oleksandr Tkachenko</author>
<author orcid="0000-0001-8610-9936" pid="59/5806-1">Zheng Yang 0001</author>
<title>Faster privacy-preserving location proximity schemes for circles and polygons.</title>
<pages>254-265</pages>
<year>2020</year>
<volume>14</volume>
<journal>IET Inf. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.1049/iet-ifs.2019.0125</ee>
<ee>https://www.wikidata.org/entity/Q127023916</ee>
<url>db/journals/iet-ifs/iet-ifs14.html#JarvinenKSTY20</url>
</article>
</r>
<r><article key="journals/tvlsi/BahadoriJ20" mdate="2023-08-28">
<author orcid="0000-0002-2964-2504" pid="174/8359">Milad Bahadori</author>
<author orcid="0000-0001-8012-2881" pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>A Programmable SoC-Based Accelerator for Privacy-Enhancing Technologies and Functional Encryption.</title>
<pages>2182-2195</pages>
<year>2020</year>
<volume>28</volume>
<journal>IEEE Trans. Very Large Scale Integr. Syst.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TVLSI.2020.3010585</ee>
<ee>https://www.wikidata.org/entity/Q121366565</ee>
<url>db/journals/tvlsi/tvlsi28.html#BahadoriJ20</url>
</article>
</r>
<r><inproceedings key="conf/dsd/Bahadori020" mdate="2021-10-14">
<author orcid="0000-0002-2964-2504" pid="174/8359">Milad Bahadori</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>A Programmable SoC Implementation of the DGK Cryptosystem for Privacy-Enhancing Technologies.</title>
<pages>254-261</pages>
<year>2020</year>
<booktitle>DSD</booktitle>
<ee>https://doi.org/10.1109/DSD51259.2020.00049</ee>
<crossref>conf/dsd/2020</crossref>
<url>db/conf/dsd/dsd2020.html#Bahadori020</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fpl/Bahadori020" mdate="2021-10-14">
<author orcid="0000-0002-2964-2504" pid="174/8359">Milad Bahadori</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>Compact and Programmable yet High-Performance SoC Architecture for Cryptographic Pairings.</title>
<pages>176-184</pages>
<year>2020</year>
<booktitle>FPL</booktitle>
<ee>https://doi.org/10.1109/FPL50879.2020.00038</ee>
<crossref>conf/fpl/2020</crossref>
<url>db/conf/fpl/fpl2020.html#Bahadori020</url>
</inproceedings>
</r>
<r><article key="journals/jowua/Yang019" mdate="2020-05-17">
<author pid="59/5806-1">Zheng Yang 0001</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its Application.</title>
<pages>4-22</pages>
<year>2019</year>
<volume>10</volume>
<journal>J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.22667/JOWUA.2019.03.31.004</ee>
<url>db/journals/jowua/jowua10.html#Yang019</url>
</article>
</r>
<r><inproceedings key="conf/eurosp/0001LLR0TY19" mdate="2020-05-12">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author orcid="0000-0002-2333-3065" pid="69/5682">Helena Lepp&#228;koski</author>
<author orcid="0000-0003-1718-6924" pid="62/1191">Elena Simona Lohan</author>
<author pid="01/7272">Philipp Richter</author>
<author orcid="0000-0001-8090-1316" pid="06/3872-3">Thomas Schneider 0003</author>
<author pid="213/7432">Oleksandr Tkachenko</author>
<author pid="59/5806-1">Zheng Yang 0001</author>
<title>PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing.</title>
<pages>448-463</pages>
<year>2019</year>
<booktitle>EuroS&#38;P</booktitle>
<ee>https://doi.org/10.1109/EuroSP.2019.00040</ee>
<crossref>conf/eurosp/2019</crossref>
<url>db/conf/eurosp/eurosp2019.html#0001LLR0TY19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hpca/RoyT0VV19" mdate="2020-09-05">
<author pid="31/9547">Sujoy Sinha Roy</author>
<author orcid="0000-0002-0045-7794" pid="186/8758">Furkan Turan</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="31/5019">Frederik Vercauteren</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>FPGA-Based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data.</title>
<pages>387-398</pages>
<year>2019</year>
<booktitle>HPCA</booktitle>
<ee>https://doi.org/10.1109/HPCA.2019.00052</ee>
<crossref>conf/hpca/2019</crossref>
<url>db/conf/hpca/hpca2019.html#RoyT0VV19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/RoyTJVV19" mdate="2020-05-11">
<author pid="31/9547">Sujoy Sinha Roy</author>
<author pid="186/8758">Furkan Turan</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="31/5019">Frederik Vercauteren</author>
<author pid="92/16">Ingrid Verbauwhede</author>
<title>FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data.</title>
<pages>160</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/160</ee>
<url>db/journals/iacr/iacr2019.html#RoyTJVV19</url>
</article>
</r>
<r><article key="journals/jce/JarvinenRV18" mdate="2020-07-09">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="31/9547">Sujoy Sinha Roy</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>Arithmetic of $$\tau $$ &#964; -adic expansions for lightweight Koblitz curve cryptography.</title>
<pages>285-300</pages>
<year>2018</year>
<volume>8</volume>
<journal>J. Cryptogr. Eng.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s13389-018-0182-0</ee>
<url>db/journals/jce/jce8.html#JarvinenRV18</url>
</article>
</r>
<r><article key="journals/tc/RoyJVVV18" mdate="2023-10-22">
<author orcid="0000-0002-9805-5389" pid="31/9547">Sujoy Sinha Roy</author>
<author orcid="0000-0001-8012-2881" pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="35/8122">Jo Vliegen</author>
<author orcid="0000-0002-7208-9599" pid="31/5019">Frederik Vercauteren</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>HEPCloud: An FPGA-Based Multicore Processor for FV Somewhat Homomorphic Function Evaluation.</title>
<pages>1637-1650</pages>
<year>2018</year>
<volume>67</volume>
<journal>IEEE Trans. Computers</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TC.2018.2816640</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2018.2816640</ee>
<ee>https://www.wikidata.org/entity/Q121821575</ee>
<url>db/journals/tc/tc67.html#RoyJVVV18</url>
</article>
</r>
<r><inproceedings key="conf/cans/0001K0TY18" mdate="2019-10-19">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="150/0067">&#193;gnes Kiss</author>
<author pid="06/3872-3">Thomas Schneider 0003</author>
<author orcid="0000-0001-9232-6902" pid="213/7432">Oleksandr Tkachenko</author>
<author orcid="0000-0001-8610-9936" pid="59/5806-1">Zheng Yang 0001</author>
<title>Faster Privacy-Preserving Location Proximity Schemes.</title>
<pages>3-22</pages>
<year>2018</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-00434-7_1</ee>
<crossref>conf/cans/2018</crossref>
<url>db/conf/cans/cans2018.html#0001K0TY18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icl-gnss/RichterLLYJTS18" mdate="2020-05-12">
<author orcid="0000-0003-2798-7207" pid="01/7272">Philipp Richter</author>
<author orcid="0000-0002-2333-3065" pid="69/5682">Helena Lepp&#228;koski</author>
<author orcid="0000-0003-1718-6924" pid="62/1191">Elena Simona Lohan</author>
<author pid="59/5806-1">Zheng Yang 0001</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author orcid="0000-0001-9232-6902" pid="213/7432">Oleksandr Tkachenko</author>
<author orcid="0000-0001-8090-1316" pid="06/3872-3">Thomas Schneider 0003</author>
<title>Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.</title>
<pages>1-6</pages>
<year>2018</year>
<booktitle>ICL-GNSS</booktitle>
<ee>https://doi.org/10.1109/ICL-GNSS.2018.8440910</ee>
<ee>https://www.wikidata.org/entity/Q61174752</ee>
<crossref>conf/icl-gnss/2018</crossref>
<url>db/conf/icl-gnss/icl-gnss2018.html#RichterLLYJTS18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/Yang018" mdate="2019-09-26">
<author orcid="0000-0001-8610-9936" pid="59/5806-1">Zheng Yang 0001</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption.</title>
<pages>1223-1231</pages>
<year>2018</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFOCOM.2018.8486221</ee>
<crossref>conf/infocom/2018</crossref>
<url>db/conf/infocom/infocom2018.html#Yang018</url>
</inproceedings>
</r>
<r><inproceedings key="conf/provsec/Yang018" mdate="2018-11-05">
<author orcid="0000-0001-8610-9936" pid="59/5806-1">Zheng Yang 0001</author>
<author orcid="0000-0001-8012-2881" pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>Modeling Privacy in WiFi Fingerprinting Indoor Localization.</title>
<pages>329-346</pages>
<year>2018</year>
<booktitle>ProvSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-01446-9_19</ee>
<crossref>conf/provsec/2018</crossref>
<url>db/conf/provsec/provsec2018.html#Yang018</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secsr/KhanG0N18" mdate="2024-10-06">
<author pid="24/1899">Mohsin Khan</author>
<author orcid="0000-0003-4579-3668" pid="68/5081">Philip Ginzboorg</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="17/1565">Valtteri Niemi</author>
<title>Defeating the Downgrade Attack on Identity Privacy in 5G.</title>
<pages>95-119</pages>
<year>2018</year>
<booktitle>SSR</booktitle>
<ee>https://doi.org/10.1007/978-3-030-04762-7_6</ee>
<crossref>conf/secsr/2018</crossref>
<url>db/conf/secsr/ssr2018.html#KhanG0N18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1811-02293" mdate="2018-11-22">
<author pid="24/1899">Mohsin Khan</author>
<author pid="68/5081">Philip Ginzboorg</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="17/1565">Valtteri Niemi</author>
<title>Defeating the Downgrade Attack on Identity Privacy in 5G.</title>
<year>2018</year>
<volume>abs/1811.02293</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1811.02293</ee>
<url>db/journals/corr/corr1811.html#abs-1811-02293</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/YangJ18" mdate="2020-05-11">
<author pid="59/5806-1">Zheng Yang 0001</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption.</title>
<pages>259</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2018/259</ee>
<url>db/journals/iacr/iacr2018.html#YangJ18</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/JarvinenKSTY18" mdate="2020-05-11">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="150/0067">&#193;gnes Kiss</author>
<author pid="06/3872-3">Thomas Schneider 0003</author>
<author pid="213/7432">Oleksandr Tkachenko</author>
<author pid="59/5806-1">Zheng Yang 0001</author>
<title>Faster Privacy-Preserving Location Proximity Schemes.</title>
<pages>694</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2018/694</ee>
<url>db/journals/iacr/iacr2018.html#JarvinenKSTY18</url>
</article>
</r>
<r><article key="journals/access/ChenTJLALBBFHLR17" mdate="2021-11-17">
<author orcid="0000-0001-9791-5183" pid="01/5394-7">Liang Chen 0007</author>
<author pid="155/7422">Sarang Thombre</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author orcid="0000-0003-1718-6924" pid="62/1191">Elena Simona Lohan</author>
<author orcid="0000-0002-9578-077X" pid="202/0477">Anette Al&#233;n-Savikko</author>
<author orcid="0000-0002-2333-3065" pid="69/5682">Helena Lepp&#228;koski</author>
<author orcid="0000-0002-3801-1018" pid="16/5740">Mohammad Zahidul H. Bhuiyan</author>
<author orcid="0000-0002-3240-9498" pid="202/0567">Shakila Bu-Pasha</author>
<author pid="202/0641">Giorgia Nunzia Ferrara</author>
<author pid="202/0610">Salomon Honkala</author>
<author pid="202/0540">Jenna Lindqvist</author>
<author orcid="0000-0002-4057-4143" pid="135/1595">Laura Ruotsalainen</author>
<author orcid="0000-0002-6067-5689" pid="202/0595">Paivi Korpisaari</author>
<author pid="120/4062">Heidi Kuusniemi</author>
<title>Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey.</title>
<pages>8956-8977</pages>
<year>2017</year>
<volume>5</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2017.2695525</ee>
<ee>https://www.wikidata.org/entity/Q61175034</ee>
<url>db/journals/access/access5.html#ChenTJLALBBFHLR17</url>
</article>
</r>
<r><article key="journals/tc/0001GHJWV17" mdate="2023-09-30">
<author orcid="0000-0001-8578-2635" pid="70/1220-1">Zhe Liu 0001</author>
<author pid="g/JGrossschadl">Johann Gro&#223;sch&#228;dl</author>
<author pid="69/8668">Zhi Hu</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="162/8948">Husen Wang</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things.</title>
<pages>773-785</pages>
<year>2017</year>
<volume>66</volume>
<journal>IEEE Trans. Computers</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TC.2016.2623609</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2016.2623609</ee>
<url>db/journals/tc/tc66.html#0001GHJWV17</url>
</article>
</r>
<r><inproceedings key="conf/arith/0001JLS17" mdate="2023-03-23">
<author pid="70/1220-1">Zhe Liu 0001</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="03/2089-1">Weiqiang Liu 0001</author>
<author pid="121/4554">Hwajeong Seo</author>
<title>Multiprecision Multiplication on ARMv8.</title>
<pages>10-17</pages>
<year>2017</year>
<booktitle>ARITH</booktitle>
<ee>https://doi.org/10.1109/ARITH.2017.27</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARITH.2017.27</ee>
<crossref>conf/arith/2017</crossref>
<url>db/conf/arith/arith2017.html#0001JLS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/KhanJGN17" mdate="2024-10-06">
<author pid="24/1899">Mohsin Khan</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author orcid="0000-0003-4579-3668" pid="68/5081">Philip Ginzboorg</author>
<author pid="17/1565">Valtteri Niemi</author>
<title>On De-synchronization of User Pseudonyms in Mobile Networks.</title>
<pages>347-366</pages>
<year>2017</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-72598-7_22</ee>
<crossref>conf/iciss/2017</crossref>
<url>db/conf/iciss/iciss2017.html#KhanJGN17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/africacrypt/GovemJAVM16" mdate="2021-04-09">
<author pid="178/2871">Burak G&#246;vem</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author orcid="0000-0001-7214-452X" pid="29/5924">Kris Aerts</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<author orcid="0000-0001-8753-7895" pid="23/3870">Nele Mentens</author>
<title>A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates.</title>
<pages>63-83</pages>
<year>2016</year>
<booktitle>AFRICACRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-319-31517-1_4</ee>
<crossref>conf/africacrypt/2016</crossref>
<url>db/conf/africacrypt/africacrypt2016.html#GovemJAVM16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cardis/JarvinenB16" mdate="2017-12-27">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="39/8189">Josep Balasch</author>
<title>Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations.</title>
<pages>137-155</pages>
<year>2016</year>
<booktitle>CARDIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-54669-8_9</ee>
<crossref>conf/cardis/2016</crossref>
<url>db/conf/cardis/cardis2016.html#JarvinenB16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/JarvinenMAL16" mdate="2017-12-27">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="07/8338">Andrea Miele</author>
<author pid="14/7448">Reza Azarderakhsh</author>
<author pid="32/2736">Patrick Longa</author>
<title>Four &#8474; on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields.</title>
<pages>517-537</pages>
<year>2016</year>
<booktitle>CHES</booktitle>
<ee>https://doi.org/10.1007/978-3-662-53140-2_25</ee>
<crossref>conf/ches/2016</crossref>
<url>db/conf/ches/ches2016.html#JarvinenMAL16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vlsid/BosmansRJV16" mdate="2023-03-24">
<author pid="177/5881">Jeroen Bosmans</author>
<author pid="31/9547">Sujoy Sinha Roy</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>A Tiny Coprocessor for Elliptic Curve Cryptography over the 256-bit NIST Prime Field.</title>
<pages>523-528</pages>
<year>2016</year>
<booktitle>VLSID</booktitle>
<ee>https://doi.org/10.1109/VLSID.2016.82</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/VLSID.2016.82</ee>
<crossref>conf/vlsid/2016</crossref>
<url>db/conf/vlsid/vlsid2016.html#BosmansRJV16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/JarvinenMAL16" mdate="2020-05-11">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="07/8338">Andrea Miele</author>
<author pid="14/7448">Reza Azarderakhsh</author>
<author pid="32/2736">Patrick Longa</author>
<title>FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields.</title>
<pages>569</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/569</ee>
<url>db/journals/iacr/iacr2016.html#JarvinenMAL16</url>
</article>
</r>
<r><article key="journals/tc/JarvinenDA15" mdate="2017-12-27">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="02/6940">Vassil S. Dimitrov</author>
<author pid="14/7448">Reza Azarderakhsh</author>
<title>A Generalization of Addition Chains and Fast Inversions in Binary Fields.</title>
<pages>2421-2432</pages>
<year>2015</year>
<volume>64</volume>
<journal>IEEE Trans. Computers</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TC.2014.2375182</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2014.2375182</ee>
<url>db/journals/tc/tc64.html#JarvinenDA15</url>
</article>
</r>
<r><article key="journals/tcad/AzarderakhshKJ15" mdate="2020-09-24">
<author pid="14/7448">Reza Azarderakhsh</author>
<author orcid="0000-0003-4513-3109" pid="85/5526">Mehran Mozaffari Kermani</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic Applications.</title>
<pages>332-340</pages>
<year>2015</year>
<volume>34</volume>
<journal>IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TCAD.2014.2387866</ee>
<url>db/journals/tcad/tcad34.html#AzarderakhshKJ15</url>
</article>
</r>
<r><inproceedings key="conf/ches/RoyJV15" mdate="2019-10-31">
<author pid="31/9547">Sujoy Sinha Roy</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates.</title>
<pages>102-122</pages>
<year>2015</year>
<booktitle>CHES</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-662-48324-4_6</ee>
<crossref>conf/ches/2015</crossref>
<url>db/conf/ches/ches2015.html#RoyJV15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/RoyJVDV15" mdate="2019-10-31">
<author pid="31/9547">Sujoy Sinha Roy</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author orcid="0000-0002-7208-9599" pid="31/5019">Frederik Vercauteren</author>
<author pid="02/6940">Vassil S. Dimitrov</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation.</title>
<pages>164-184</pages>
<year>2015</year>
<booktitle>CHES</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-662-48324-4_9</ee>
<crossref>conf/ches/2015</crossref>
<url>db/conf/ches/ches2015.html#RoyJVDV15</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/RoyJVDV15" mdate="2020-05-11">
<author pid="31/9547">Sujoy Sinha Roy</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="31/5019">Frederik Vercauteren</author>
<author pid="02/6940">Vassil S. Dimitrov</author>
<author pid="92/16">Ingrid Verbauwhede</author>
<title>Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation.</title>
<pages>337</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/337</ee>
<url>db/journals/iacr/iacr2015.html#RoyJVDV15</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/RoyJV15" mdate="2020-05-11">
<author pid="31/9547">Sujoy Sinha Roy</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="92/16">Ingrid Verbauwhede</author>
<title>Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates.</title>
<pages>556</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/556</ee>
<url>db/journals/iacr/iacr2015.html#RoyJV15</url>
</article>
</r>
<r><article key="journals/tc/AzarderakhshJD14" mdate="2017-12-27">
<author pid="14/7448">Reza Azarderakhsh</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="02/6940">Vassil S. Dimitrov</author>
<title>Fast Inversion in ${\schmi{GF(2^m)}}$ with Normal Basis Using Hybrid-Double Multipliers.</title>
<pages>1041-1047</pages>
<year>2014</year>
<volume>63</volume>
<journal>IEEE Trans. Computers</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TC.2012.265</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2012.265</ee>
<url>db/journals/tc/tc63.html#AzarderakhshJD14</url>
</article>
</r>
<r><article key="journals/tcas/AzarderakhshJK14" mdate="2020-05-22">
<author pid="14/7448">Reza Azarderakhsh</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author orcid="0000-0003-4513-3109" pid="85/5526">Mehran Mozaffari Kermani</author>
<title>Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications.</title>
<pages>1144-1155</pages>
<year>2014</year>
<volume>61-I</volume>
<journal>IEEE Trans. Circuits Syst. I Regul. Pap.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TCSI.2013.2283691</ee>
<url>db/journals/tcas/tcasI61.html#AzarderakhshJK14</url>
</article>
</r>
<r><inproceedings key="conf/cardis/JarvinenV14" mdate="2018-11-02">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</author>
<title>How to Use Koblitz Curves on Small Devices?</title>
<pages>154-170</pages>
<year>2014</year>
<booktitle>CARDIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-16763-3_10</ee>
<crossref>conf/cardis/2014</crossref>
<url>db/conf/cardis/cardis2014.html#JarvinenV14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/arith/DimitrovJ13" mdate="2023-03-23">
<author pid="02/6940">Vassil S. Dimitrov</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>Another Look at Inversions over Binary Fields.</title>
<pages>211-218</pages>
<year>2013</year>
<booktitle>IEEE Symposium on Computer Arithmetic</booktitle>
<ee>https://doi.org/10.1109/ARITH.2013.25</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARITH.2013.25</ee>
<crossref>conf/arith/2013</crossref>
<url>db/conf/arith/arith2013.html#DimitrovJ13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wistp/HoerderJP13" mdate="2020-10-25">
<author orcid="0000-0002-8393-548X" pid="70/9687">Simon Hoerder</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="p/DanPage">Daniel Page</author>
<title>On Secure Embedded Token Design.</title>
<pages>112-128</pages>
<year>2013</year>
<booktitle>WISTP</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-38530-8_8</ee>
<crossref>conf/wistp/2013</crossref>
<url>db/conf/wistp/wistp2013.html#HoerderJP13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/HoerderJP13" mdate="2020-05-11">
<author pid="70/9687">Simon Hoerder</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="p/DanPage">Dan Page</author>
<title>On secure embedded token design (Long Version) - Quasi-looped Yao circuits and bounded leakage.</title>
<pages>168</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/168</ee>
<url>db/journals/iacr/iacr2013.html#HoerderJP13</url>
</article>
</r>
<r><article key="journals/jce/GrabherGHJPTW12" mdate="2020-10-26">
<author pid="72/6973">Philipp Grabher</author>
<author pid="g/JGrossschadl">Johann Gro&#223;sch&#228;dl</author>
<author orcid="0000-0002-8393-548X" pid="70/9687">Simon Hoerder</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="p/DanPage">Daniel Page</author>
<author pid="21/5558">Stefan Tillich</author>
<author pid="58/9687">Marcin W&#243;jcik</author>
<title>An exploration of mechanisms for dynamic cryptographic instruction set extension.</title>
<pages>1-18</pages>
<year>2012</year>
<volume>2</volume>
<journal>J. Cryptogr. Eng.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s13389-011-0025-8</ee>
<url>db/journals/jce/jce2.html#GrabherGHJPTW12</url>
</article>
</r>
<r><article key="journals/tc/AdikariDJ12" mdate="2017-05-20">
<author pid="10/7693">Jithra Adikari</author>
<author pid="02/6940">Vassil S. Dimitrov</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<title>A Fast Hardware Architecture for Integer to \tauNAF Conversion for Koblitz Curves.</title>
<pages>732-737</pages>
<year>2012</year>
<volume>61</volume>
<journal>IEEE Trans. Computers</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TC.2011.87</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2011.87</ee>
<url>db/journals/tc/tc61.html#AdikariDJ12</url>
</article>
</r>
<r><inproceedings key="conf/fdtc/JarvinenBPT12" mdate="2023-03-24">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="61/9451">C&#233;line Blondeau</author>
<author pid="p/DanPage">Dan Page</author>
<author orcid="0000-0002-7107-8644" pid="55/2065">Michael Tunstall</author>
<title>Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes.</title>
<pages>72-82</pages>
<year>2012</year>
<booktitle>FDTC</booktitle>
<ee>https://doi.org/10.1109/FDTC.2012.13</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/FDTC.2012.13</ee>
<crossref>conf/fdtc/2012</crossref>
<url>db/conf/fdtc/fdtc2012.html#JarvinenBPT12</url>
</inproceedings>
</r>
<r><proceedings key="conf/nordsec/2010" mdate="2019-05-14">
<editor pid="a/TAura">Tuomas Aura</editor>
<editor pid="93/54">Kimmo J&#228;rvinen 0001</editor>
<editor pid="46/2601">Kaisa Nyberg</editor>
<title>Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers</title>
<volume>7127</volume>
<year>2012</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<ee>https://doi.org/10.1007/978-3-642-27937-9</ee>
<isbn>978-3-642-27936-2</isbn>
<booktitle>NordSec</booktitle>
<url>db/conf/nordsec/nordsec2010.html</url>
</proceedings>
</r>
<r><article key="journals/integration/Jarvinen11" mdate="2020-02-20">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<title>Optimized FPGA-based elliptic curve cryptography processor for high-speed applications.</title>
<pages>270-279</pages>
<year>2011</year>
<volume>44</volume>
<journal>Integr.</journal>
<number>4</number>
<ee>https://doi.org/10.1016/j.vlsi.2010.08.001</ee>
<url>db/journals/integration/integration44.html#Jarvinen11</url>
</article>
</r>
<r><article key="journals/tc/DimitrovJA11" mdate="2017-05-20">
<author pid="02/6940">Vassil S. Dimitrov</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="10/7693">Jithra Adikari</author>
<title>Area-Efficient Multipliers Based on Multiple-Radix Representations.</title>
<pages>189-201</pages>
<year>2011</year>
<volume>60</volume>
<journal>IEEE Trans. Computers</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TC.2010.200</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2010.200</ee>
<url>db/journals/tc/tc60.html#DimitrovJA11</url>
</article>
</r>
<r><inproceedings key="conf/ches/GrabherGHJPTW11" mdate="2020-10-25">
<author pid="72/6973">Philipp Grabher</author>
<author pid="g/JGrossschadl">Johann Gro&#223;sch&#228;dl</author>
<author orcid="0000-0002-8393-548X" pid="70/9687">Simon Hoerder</author>
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="p/DanPage">Dan Page</author>
<author pid="21/5558">Stefan Tillich</author>
<author pid="58/9687">Marcin W&#243;jcik</author>
<title>An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension.</title>
<pages>1-16</pages>
<year>2011</year>
<booktitle>CHES</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-23951-9_1</ee>
<crossref>conf/ches/2011</crossref>
<url>db/conf/ches/ches2011.html#GrabherGHJPTW11</url>
</inproceedings>
</r>
<r><article key="journals/tc/BrumleyJ10" mdate="2017-09-16">
<author orcid="0000-0001-9160-0463" pid="25/1876">Billy Bob Brumley</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<title>Conversion Algorithms and Implementations for Koblitz Curve Cryptography.</title>
<pages>81-92</pages>
<year>2010</year>
<volume>59</volume>
<journal>IEEE Trans. Computers</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TC.2009.132</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2009.132</ee>
<url>db/journals/tc/tc59.html#BrumleyJ10</url>
</article>
</r>
<r><inproceedings key="conf/ches/JarvinenKSS10" mdate="2018-11-02">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="65/6001">Vladimir Kolesnikov</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author orcid="0000-0001-8090-1316" pid="06/3872-3">Thomas Schneider 0003</author>
<title>Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).</title>
<pages>383-397</pages>
<year>2010</year>
<booktitle>CHES</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-15031-9_26</ee>
<crossref>conf/ches/2010</crossref>
<url>db/conf/ches/ches2010.html#JarvinenKSS10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fc/JarvinenKSS10" mdate="2018-11-02">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="65/6001">Vladimir Kolesnikov</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author orcid="0000-0001-8090-1316" pid="06/3872-3">Thomas Schneider 0003</author>
<title>Embedded SFE: Offloading Server and Network Using Hardware Tokens.</title>
<pages>207-221</pages>
<year>2010</year>
<booktitle>Financial Cryptography</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14577-3_17</ee>
<crossref>conf/fc/2010</crossref>
<url>db/conf/fc/fc2010.html#JarvinenKSS10</url>
</inproceedings>
</r>
<r><incollection key="series/isc/JarvinenKS010" mdate="2018-11-02">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="65/6001">Vladimir Kolesnikov</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author orcid="0000-0001-8090-1316" pid="06/3872-3">Thomas Schneider 0003</author>
<title>Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version).</title>
<pages>367-386</pages>
<year>2010</year>
<booktitle>Towards Hardware-Intrinsic Security</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14452-3_17</ee>
<crossref>series/isc/364214451</crossref>
<url>db/series/isc/isc364214451.html#JarvinenKS010</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/iacr/JarvinenKS010" mdate="2020-05-11">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="65/6001">Vladimir Kolesnikov</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="06/3872-3">Thomas Schneider 0003</author>
<title>Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.</title>
<pages>276</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/276</ee>
<url>db/journals/iacr/iacr2010.html#JarvinenKS010</url>
</article>
</r>
<r><article key="journals/mam/JarvinenS09" mdate="2020-02-22">
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="04/808">Jorma Skytt&#228;</author>
<title>Fast point multiplication on Koblitz curves: Parallelization method and implementations.</title>
<pages>106-116</pages>
<year>2009</year>
<volume>33</volume>
<journal>Microprocess. Microsystems</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.micpro.2008.08.002</ee>
<url>db/journals/mam/mam33.html#JarvinenS09</url>
</article>
</r>
<r><inproceedings key="conf/sacrypt/Jarvinen09" mdate="2018-06-26">
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<title>On Repeated Squarings in Binary Fields.</title>
<pages>331-349</pages>
<year>2009</year>
<booktitle>Selected Areas in Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-05445-7_21</ee>
<crossref>conf/sacrypt/2009</crossref>
<url>db/conf/sacrypt/sacrypt2009.html#Jarvinen09</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/JarvinenKS009" mdate="2020-05-11">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="65/6001">Vladimir Kolesnikov</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="06/3872-3">Thomas Schneider 0003</author>
<title>Embedded SFE: Offloading Server and Network using Hardware Tokens.</title>
<pages>591</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/591</ee>
<url>db/journals/iacr/iacr2009.html#JarvinenKS009</url>
</article>
</r>
<r><article key="journals/tc/DimitrovJJCH08" mdate="2017-11-28">
<author pid="02/6940">Vassil S. Dimitrov</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="45/6579">Michael J. Jacobson Jr.</author>
<author pid="10/1316">W. F. Chan</author>
<author pid="27/6087">Zhun Huang</author>
<title>Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation.</title>
<pages>1469-1481</pages>
<year>2008</year>
<volume>57</volume>
<journal>IEEE Trans. Computers</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TC.2008.65</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2008.65</ee>
<url>db/journals/tc/tc57.html#DimitrovJJCH08</url>
</article>
</r>
<r><article key="journals/tvlsi/JarvinenS08" mdate="2020-03-11">
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="04/808">Jorma Skytt&#228;</author>
<title>On Parallelization of High-Speed Processors for Elliptic Curve Cryptography.</title>
<pages>1162-1175</pages>
<year>2008</year>
<volume>16</volume>
<journal>IEEE Trans. Very Large Scale Integr. Syst.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TVLSI.2008.2000728</ee>
<url>db/journals/tvlsi/tvlsi16.html#JarvinenS08</url>
</article>
</r>
<r><inproceedings key="conf/europki/BrumleyJ08" mdate="2017-11-06">
<author orcid="0000-0001-9160-0463" pid="25/1876">Billy Bob Brumley</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<title>Fast Point Decompression for Standard Elliptic Curves.</title>
<pages>134-149</pages>
<year>2008</year>
<booktitle>EuroPKI</booktitle>
<ee>https://doi.org/10.1007/978-3-540-69485-4_10</ee>
<crossref>conf/europki/2008</crossref>
<url>db/conf/europki/europki2008.html#BrumleyJ08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fccm/JarvinenS08" mdate="2023-03-24">
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="04/808">Jorma O. Skytt&#228;</author>
<title>High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves.</title>
<pages>109-118</pages>
<year>2008</year>
<booktitle>FCCM</booktitle>
<ee>https://doi.org/10.1109/FCCM.2008.30</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/FCCM.2008.30</ee>
<crossref>conf/fccm/2008</crossref>
<url>db/conf/fccm/fccm2008.html#JarvinenS08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/JarvinenFS07" mdate="2017-05-21">
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="29/4635">Juha Forsten</author>
<author pid="04/808">Jorma Skytt&#228;</author>
<title>FPGA Design of Self-certified Signature Verification on Koblitz Curves.</title>
<pages>256-271</pages>
<year>2007</year>
<crossref>conf/ches/2007</crossref>
<booktitle>CHES</booktitle>
<ee>https://doi.org/10.1007/978-3-540-74735-2_18</ee>
<url>db/conf/ches/ches2007.html#JarvinenFS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/BrumleyJ07" mdate="2018-06-26">
<author orcid="0000-0001-9160-0463" pid="25/1876">Billy Bob Brumley</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<title>Koblitz Curves and Integer Equivalents of Frobenius Expansions.</title>
<pages>126-137</pages>
<year>2007</year>
<crossref>conf/sacrypt/2007</crossref>
<booktitle>Selected Areas in Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-77360-3_9</ee>
<url>db/conf/sacrypt/sacrypt2007.html#BrumleyJ07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/DimitrovJJCH06" mdate="2017-11-28">
<author pid="02/6940">Vassil S. Dimitrov</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="45/6579">Michael J. Jacobson Jr.</author>
<author pid="10/1316">W. F. Chan</author>
<author pid="27/6087">Zhun Huang</author>
<title>FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers.</title>
<pages>445-459</pages>
<year>2006</year>
<crossref>conf/ches/2006</crossref>
<booktitle>CHES</booktitle>
<ee>https://doi.org/10.1007/11894063_35</ee>
<url>db/conf/ches/ches2006.html#DimitrovJJCH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icecsys/JarvinenFS06" mdate="2017-12-27">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="29/4635">Juha Forsten</author>
<author pid="04/808">Jorma Skytt&#228;</author>
<title>Efficient Circuitry for Computing &#964;-adic Non-Adjacent Form.</title>
<pages>232-235</pages>
<year>2006</year>
<booktitle>ICECS</booktitle>
<ee>https://doi.org/10.1109/ICECS.2006.379768</ee>
<crossref>conf/icecsys/2006</crossref>
<url>db/conf/icecsys/icecsys2006.html#JarvinenFS06</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/DimitrovJJJCH06" mdate="2020-05-11">
<author pid="02/6940">Vassil S. Dimitrov</author>
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="45/6579">Michael J. Jacobson Jr.</author>
<author pid="10/1316">W. F. Chan</author>
<author pid="27/6087">Zhun Huang</author>
<title>Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation.</title>
<pages>305</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/305</ee>
<url>db/journals/iacr/iacr2006.html#DimitrovJJJCH06</url>
</article>
</r>
<r><inproceedings key="conf/ersa/JarvinenTS05" mdate="2006-02-07">
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="86/4876">Matti Tommiska</author>
<author pid="04/808">Jorma Skytt&#228;</author>
<title>A Compact MD5 and SHA-1 Co-Implementation Utilizing Algorithm Similarities.</title>
<pages>48-54</pages>
<year>2005</year>
<crossref>conf/ersa/2005</crossref>
<booktitle>ERSA</booktitle>
<url>db/conf/ersa/ersa2005.html#JarvinenTS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/JarvinenTS05" mdate="2023-03-24">
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="86/4876">Matti Tommiska</author>
<author pid="04/808">Jorma Skytt&#228;</author>
<title>Hardware Implementation Analysis of the MD5 Hash Algorithm.</title>
<year>2005</year>
<crossref>conf/hicss/2005</crossref>
<booktitle>HICSS</booktitle>
<ee>https://doi.org/10.1109/HICSS.2005.291</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.2005.291</ee>
<url>db/conf/hicss/hicss2005.html#JarvinenTS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fpl/JarvinenTS04" mdate="2017-05-21">
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="86/4876">Matti Tommiska</author>
<author pid="04/808">Jorma Skytt&#228;</author>
<title>A VHDL Generator for Elliptic Curve Cryptography.</title>
<pages>1098-1100</pages>
<ee>https://doi.org/10.1007/978-3-540-30117-2_136</ee>
<year>2004</year>
<crossref>conf/fpl/2004</crossref>
<booktitle>FPL</booktitle>
<url>db/conf/fpl/fpl2004.html#JarvinenTS04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fpt/JarvinenTS04" mdate="2017-12-27">
<author pid="93/54">Kimmo J&#228;rvinen 0001</author>
<author pid="86/4876">Matti Tommiska</author>
<author pid="04/808">Jorma Skytt&#228;</author>
<title>A scalable architecture for elliptic curve point multiplication.</title>
<pages>303-306</pages>
<year>2004</year>
<booktitle>FPT</booktitle>
<ee>https://doi.org/10.1109/FPT.2004.1393285</ee>
<crossref>conf/fpt/2004</crossref>
<url>db/conf/fpt/fpt2004.html#JarvinenTS04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fpga/JarvinenTS03" mdate="2018-11-06">
<author pid="93/54">Kimmo U. J&#228;rvinen</author>
<author pid="86/4876">Matti Tommiska</author>
<author pid="04/808">Jorma Skytt&#228;</author>
<title>A fully pipelined memoryless 17.8 Gbps AES-128 encryptor.</title>
<pages>207-215</pages>
<year>2003</year>
<crossref>conf/fpga/2003</crossref>
<booktitle>FPGA</booktitle>
<ee>https://doi.org/10.1145/611817.611848</ee>
<url>db/conf/fpga/fpga2003.html#JarvinenTS03</url>
</inproceedings>
</r>
<coauthors n="65" nc="2">
<co c="0"><na f="a/Adikari:Jithra" pid="10/7693">Jithra Adikari</na></co>
<co c="0"><na f="a/Aerts:Kris" pid="29/5924">Kris Aerts</na></co>
<co c="0"><na f="a/Al=eacute=n=Savikko:Anette" pid="202/0477">Anette Al&#233;n-Savikko</na></co>
<co c="0"><na f="a/Aura:Tuomas" pid="a/TAura">Tuomas Aura</na></co>
<co c="0"><na f="a/Azarderakhsh:Reza" pid="14/7448">Reza Azarderakhsh</na></co>
<co c="0"><na f="b/Bahadori:Milad" pid="174/8359">Milad Bahadori</na></co>
<co c="0"><na f="b/Balasch:Josep" pid="39/8189">Josep Balasch</na></co>
<co c="0"><na f="b/Bhuiyan:Mohammad_Zahidul_H=" pid="16/5740">Mohammad Zahidul H. Bhuiyan</na></co>
<co c="0"><na f="b/Blondeau:C=eacute=line" pid="61/9451">C&#233;line Blondeau</na></co>
<co c="0"><na f="b/Bosmans:Jeroen" pid="177/5881">Jeroen Bosmans</na></co>
<co c="0"><na f="b/Brumley:Billy_Bob" pid="25/1876">Billy Bob Brumley</na></co>
<co c="0"><na f="b/Bu=Pasha:Shakila" pid="202/0567">Shakila Bu-Pasha</na></co>
<co c="0"><na f="c/Chan:W=_F=" pid="10/1316">W. F. Chan</na></co>
<co c="0"><na f="c/Chen_0007:Liang" pid="01/5394-7">Liang Chen 0007</na></co>
<co c="0"><na f="d/Dimitrov:Vassil_S=" pid="02/6940">Vassil S. Dimitrov</na></co>
<co c="0"><na f="f/Ferrara:Giorgia_Nunzia" pid="202/0641">Giorgia Nunzia Ferrara</na></co>
<co c="1"><na f="f/Forsten:Juha" pid="29/4635">Juha Forsten</na></co>
<co c="0"><na f="g/Ginzboorg:Philip" pid="68/5081">Philip Ginzboorg</na></co>
<co c="0"><na f="g/G=ouml=vem:Burak" pid="178/2871">Burak G&#246;vem</na></co>
<co c="0"><na f="g/Grabher:Philipp" pid="72/6973">Philipp Grabher</na></co>
<co c="0"><na f="g/Gro=szlig=sch=auml=dl:Johann" pid="g/JGrossschadl">Johann Gro&#223;sch&#228;dl</na></co>
<co c="0"><na f="h/Hoerder:Simon" pid="70/9687">Simon Hoerder</na></co>
<co c="0"><na f="h/Honkala:Salomon" pid="202/0610">Salomon Honkala</na></co>
<co c="0"><na f="h/Hu:Zhi" pid="69/8668">Zhi Hu</na></co>
<co c="0"><na f="h/Huang:Zhun" pid="27/6087">Zhun Huang</na></co>
<co c="0"><na f="j/Jacobson_Jr=:Michael_J=" pid="45/6579">Michael J. Jacobson Jr.</na></co>
<co c="0"><na f="k/Kermani:Mehran_Mozaffari" pid="85/5526">Mehran Mozaffari Kermani</na></co>
<co c="0"><na f="k/Khan:Mohsin" pid="24/1899">Mohsin Khan</na></co>
<co c="0"><na f="k/Kiss:=Aacute=gnes" pid="150/0067">&#193;gnes Kiss</na></co>
<co c="0"><na f="k/Kolesnikov:Vladimir" pid="65/6001">Vladimir Kolesnikov</na></co>
<co c="0"><na f="k/Korpisaari:Paivi" pid="202/0595">Paivi Korpisaari</na></co>
<co c="0"><na f="k/Kuusniemi:Heidi" pid="120/4062">Heidi Kuusniemi</na></co>
<co c="0"><na f="l/Lepp=auml=koski:Helena" pid="69/5682">Helena Lepp&#228;koski</na></co>
<co c="0"><na f="l/Lindqvist:Jenna" pid="202/0540">Jenna Lindqvist</na></co>
<co c="0"><na f="l/Liu_0001:Weiqiang" pid="03/2089-1">Weiqiang Liu 0001</na></co>
<co c="0"><na f="l/Liu_0001:Zhe" pid="70/1220-1">Zhe Liu 0001</na></co>
<co c="0"><na f="l/Lohan:Elena_Simona" pid="62/1191">Elena Simona Lohan</na></co>
<co c="0"><na f="l/Longa:Patrick" pid="32/2736">Patrick Longa</na></co>
<co c="0"><na f="m/Marc:Tilen" pid="140/7360">Tilen Marc</na></co>
<co c="0"><na f="m/Mentens:Nele" pid="23/3870">Nele Mentens</na></co>
<co c="0"><na f="m/Miele:Andrea" pid="07/8338">Andrea Miele</na></co>
<co c="0"><na f="n/Niemi:Valtteri" pid="17/1565">Valtteri Niemi</na></co>
<co c="0"><na f="n/Nieminen:Raine" pid="299/0033">Raine Nieminen</na></co>
<co c="0"><na f="n/Nyberg:Kaisa" pid="46/2601">Kaisa Nyberg</na></co>
<co c="0" n="2"><na f="p/Page:Dan" pid="p/DanPage">Dan Page</na><na>Daniel Page</na></co>
<co c="0"><na f="r/Richter:Philipp" pid="01/7272">Philipp Richter</na></co>
<co c="0"><na f="r/Roy:Sujoy_Sinha" pid="31/9547">Sujoy Sinha Roy</na></co>
<co c="0"><na f="r/Ruotsalainen:Laura" pid="135/1595">Laura Ruotsalainen</na></co>
<co c="0"><na f="s/Sadeghi:Ahmad=Reza" pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</na></co>
<co c="0"><na f="s/Schneider_0003:Thomas" pid="06/3872-3">Thomas Schneider 0003</na></co>
<co c="0"><na f="s/Seo:Hwajeong" pid="121/4554">Hwajeong Seo</na></co>
<co c="1" n="2"><na f="s/Skytt=auml=:Jorma" pid="04/808">Jorma Skytt&#228;</na><na>Jorma O. Skytt&#228;</na></co>
<co c="0"><na f="s/Stopar:Miha" pid="40/10256">Miha Stopar</na></co>
<co c="0"><na f="t/Thombre:Sarang" pid="155/7422">Sarang Thombre</na></co>
<co c="0"><na f="t/Tillich:Stefan" pid="21/5558">Stefan Tillich</na></co>
<co c="0"><na f="t/Tkachenko:Oleksandr" pid="213/7432">Oleksandr Tkachenko</na></co>
<co c="1"><na f="t/Tommiska:Matti" pid="86/4876">Matti Tommiska</na></co>
<co c="0"><na f="t/Tunstall:Michael" pid="55/2065">Michael Tunstall</na></co>
<co c="0"><na f="t/Turan:Furkan" pid="186/8758">Furkan Turan</na></co>
<co c="0"><na f="v/Verbauwhede:Ingrid" pid="92/16">Ingrid Verbauwhede</na></co>
<co c="0"><na f="v/Vercauteren:Frederik" pid="31/5019">Frederik Vercauteren</na></co>
<co c="0"><na f="v/Vliegen:Jo" pid="35/8122">Jo Vliegen</na></co>
<co c="0"><na f="w/Wang:Husen" pid="162/8948">Husen Wang</na></co>
<co c="0"><na f="w/W=oacute=jcik:Marcin" pid="58/9687">Marcin W&#243;jcik</na></co>
<co c="0"><na f="y/Yang_0001:Zheng" pid="59/5806-1">Zheng Yang 0001</na></co>
</coauthors>
</dblpperson>

