2008 |
26 | EE | Yi Wang,
Douglas L. Maskell,
Jussipekka Leiwo:
A unified architecture for a public key cryptographic coprocessor.
Journal of Systems Architecture - Embedded Systems Design 54(10): 1004-1016 (2008) |
2007 |
25 | EE | Yu Yu,
Jussipekka Leiwo,
Benjamin Premkumar:
Private stateful circuits secure against probing attacks.
ASIACCS 2007: 63-69 |
2006 |
24 | EE | Yu Yu,
Jussipekka Leiwo,
Benjamin Premkumar:
Hiding Circuit Topology from Unbounded Reverse Engineers.
ACISP 2006: 171-182 |
23 | EE | Yi Wang,
Douglas L. Maskell,
Jussipekka Leiwo,
Thambipillai Srikanthan:
Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems.
APCCAS 2006: 1655-1658 |
22 | EE | Yi Wang,
Jussipekka Leiwo,
Thambipillai Srikanthan,
Luo Jianwen:
An Efficient Algorithm for DPA-resistent RSA.
APCCAS 2006: 1659-1662 |
21 | EE | Douglas L. Maskell,
Jussipekka Leiwo,
Jagdish Chandra Patra:
The design of multiplierless FIR filters with a minimum adder step and reduced hardware complexity.
ISCAS 2006 |
20 | EE | Yu Yu,
Jussipekka Leiwo,
Benjamin Premkumar:
A Study on the Security of Privacy Homomorphism.
ITNG 2006: 470-475 |
19 | EE | Yi Wang,
Jussipekka Leiwo,
Thambipillai Srikanthan,
Yu Yu:
FPGA based DPA-resistant Unified Architecture for Signcryption.
ITNG 2006: 571-572 |
18 | EE | Jussipekka Leiwo,
Lam-For Kwok,
Douglas L. Maskell,
Nenad Stankovic:
A technique for expressing IT security objectives.
Information & Software Technology 48(7): 532-539 (2006) |
2005 |
17 | EE | Yu Yu,
Jussipekka Leiwo,
Benjamin Premkumar:
An Improved Secure Two-Party Computation Protocol.
CISC 2005: 221-232 |
16 | EE | Yi Wang,
Jussipekka Leiwo,
Thambipillai Srikanthan:
Efficient high radix modular multiplication for high-speed computing in re-configurable hardware [cryptographic applications].
ISCAS (2) 2005: 1226-1229 |
15 | EE | Yu Yu,
Jussipekka Leiwo,
Benjamin Premkumar:
Securely Utilizing External Computing Power.
ITCC (1) 2005: 762-767 |
14 | EE | Jussipekka Leiwo,
Teemupekka Virtanen:
Understanding and Communicating It Security Specifications with Uml.
International Journal of Software Engineering and Knowledge Engineering 15(6): 923-940 (2005) |
2000 |
13 | | Chandana Gamage,
Jussipekka Leiwo,
Yuliang Zheng:
High Performance Agile Crypto Modules.
ACISP 2000: 74-88 |
12 | | Jussipekka Leiwo,
Tuomas Aura,
Pekka Nikander:
Towards Network Denial of Service Resistant Protocols.
SEC 2000: 301-310 |
11 | | Jussipekka Leiwo,
Christoph Hänle,
Philip Homburg,
Andrew S. Tanenbaum:
Disallowing Unauthorized State Changes of Distributed Shared Objects.
SEC 2000: 381-390 |
10 | EE | Tuomas Aura,
Pekka Nikander,
Jussipekka Leiwo:
DOS-Resistant Authentication with Client Puzzles.
Security Protocols Workshop 2000: 170-177 |
1999 |
9 | EE | Jussipekka Leiwo,
Chandana Gamage,
Yuliang Zheng:
Organizational Modeling for Efficient Specification of Information Security Requirements.
ADBIS 1999: 247-260 |
8 | EE | Jussipekka Leiwo:
A Mechanism for Deriving Specifications of Security Functions in the CC Framework.
DEXA 1999: 416-425 |
7 | | Chandana Gamage,
Jussipekka Leiwo,
Yuliang Zheng:
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.
ICISC 1999: 120-131 |
6 | | Jussipekka Leiwo,
Christoph Hänle,
Philip Homburg,
Chandana Gamage,
Andrew S. Tanenbaum:
A Security Design for a Wide-Area Distributed System.
ICISC 1999: 236-256 |
5 | EE | Chandana Gamage,
Jussipekka Leiwo,
Yuliang Zheng:
Encrypted Message Authentication by Firewalls.
Public Key Cryptography 1999: 69-81 |
1998 |
4 | EE | Jussipekka Leiwo,
Seppo Heikkuri:
An Analysis of Ethics as Foundation of Information Security in Distributed Systems.
HICSS (6) 1998: 213-222 |
1997 |
3 | | Jussipekka Leiwo,
Yuliang Zheng:
A Method to Implement a Denial of Service Protection Base.
ACISP 1997: 90-101 |
2 | | Jussipekka Leiwo,
Yuliang Zheng:
A Framework for the Management of Information Security.
ISW 1997: 232-245 |
1 | | Jussipekka Leiwo,
Yuliang Zheng:
A formal model to aid documenting and harmonizing of information security requirements.
SEC 1997: 25-38 |