Name
Affiliation
Papers
GUOQIANG BAI
Institute of Micro Electronics, Tsinghua University, Beijing, People's Republic of China 100084
35
Collaborators
Citations 
PageRank 
36
75
14.56
Referers 
Referees 
References 
159
370
233
Search Limit
100370
Title
Citations
PageRank
Year
Hardware Implementation Of Convolutional Neural Network For Face Feature Extraction00.342019
Efficient Hardware Implementation of Roadrunner for Lightweight Application00.342016
A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field.00.342016
High-Speed Polynomial Multiplier Architecture for Ring-LWE Based Public Key Cryptosystems.40.452016
Detecting first-order leakages against the tower field masking scheme00.342016
A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems.00.342016
Specific hardware implementation for cofactorization in GNFS00.342016
Towards efficient discrete Gaussian sampling for lattice-based cryptography30.412015
Improving Second-Order DPA Attacks with New Modeled Power Leakages.00.342015
An efficient method for integer factorization20.462015
Strategy of Relations Collection in Factoring RSA Modulus.00.342015
A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography00.342015
Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance.00.342015
A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography00.342015
Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUs00.342015
Efficient Modular Reduction Algorithm Without Correction Phase.00.342015
On trojan side channel design and identification20.362014
Ultra High-Speed SM2 ASIC Implementation20.352014
Attacks on Physically-Embedded Data Encryption for Embedded Devices00.342014
Exploring the speed limit of SM200.342014
A Novel Relative Frequency Based Ring Oscillator Physical Unclonable Function20.402014
A randomized window-scanning RSA scheme resistant to power analysis10.362014
A Novel Technique for Ring Oscillator Based PUFs to Enroll Stable Challenge Response Pairs00.342014
Integration of information security chips based on System-in-Package00.342011
Design and implementation of pipelined TMVP multiplier using block recombination00.342011
A Gbps IPSec SSL Security Processor Design and Implementation in an FPGA Prototyping Platform40.522010
A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m)10.342009
A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced Capacitances of Differential Interconnections in Dual-Rail Logic Styles00.342009
A dual-field elliptic curve cryptographic processor based on a systolic arithmetic unit30.452008
Zodiac: System architecture implementation for a high-performance Network Security Processor60.582008
A New Systolic Architecture for Modular Division40.492007
A High-Performance Elliptic Curve Cryptographic Processor for General Curves Over GF(p) Based on a Systolic Arithmetic Unit361.572007
A Novel Unified Control Architecture for a High-Performance Network Security Accelerator20.502007
Stability conditions for discrete hopfield neural networks with delay30.562006
Convergence study of discrete neural networks with delay00.342006