Andrew Moss

According to our database1, Andrew Moss authored at least 17 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Finding a needle in a haystack - A comparative study of IPv6 scanning methods.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

2013
Generalised Mersenne numbers revisited.
Math. Comput., 2013

2012
Compiler Assisted Masking.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Automatic Insertion of DPA Countermeasures.
IACR Cryptol. ePrint Arch., 2011

Type Checking Cryptography Implementations.
Proceedings of the Fundamentals of Software Engineering - 4th IPM International Conference, 2011

2010
Bridging the gap between symbolic and efficient AES implementations.
Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2010

2009
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography.
J. Cryptol., 2009

Program interpolation.
Proceedings of the 2009 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, 2009

2007
Executing Modular Exponentiation on a Graphics Accelerator.
IACR Cryptol. ePrint Arch., 2007

Compiler Assisted Elliptic Curve Cryptography.
IACR Cryptol. ePrint Arch., 2007

Toward Acceleration of RSA Using 3D Graphics Hardware.
Proceedings of the Cryptography and Coding, 2007

2006
A 10mW Wearable Positioning System.
Proceedings of the Tenth IEEE International Symposium on Wearable Computers (ISWC 2006), 2006

2005
Program transformation of embedded systems.
PhD thesis, 2005

Efficient Code Generation for a Domain Specific Language.
Proceedings of the Generative Programming and Component Engineering, 2005

2002
Certification of Public Keys within an Identity Based System.
Proceedings of the Information Security, 5th International Conference, 2002

Things aren't what they seem to be: innovation through technology inspiration.
Proceedings of the 4th Conference on Designing Interactive Systems: Processes, 2002


  Loading...