default search action
Kimmo Järvinen 0001
Person information
- affiliation: University of Helsinki, Finland
- affiliation (since 2016): KU Leuven, Belgium
- affiliation (2008 - 2014): Aalto University, Espoo, Finland
- affiliation (PhD 2008): Helsinki University of Technology (TKK), Espoo, Finland
Other persons with the same name
- Kimmo Järvinen 0002 — University of Helsinki, Finland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j22]Milad Bahadori, Kimmo Järvinen, Tilen Marc, Miha Stopar:
Speed Reading in the Dark: Accelerating Functional Encryption for Quadratic Functions with Reprogrammable Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 1-27 (2021) - [j21]Raine Nieminen, Kimmo Järvinen:
Practical Privacy-Preserving Indoor Localization Based on Secure Two-Party Computation. IEEE Trans. Mob. Comput. 20(9): 2877-2890 (2021) - [j20]Milad Bahadori, Kimmo Järvinen, Valtteri Niemi:
FPGA Implementations of 256-Bit SNOW Stream Ciphers for Postquantum Mobile Security. IEEE Trans. Very Large Scale Integr. Syst. 29(11): 1943-1954 (2021) - 2020
- [j19]Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang:
Faster privacy-preserving location proximity schemes for circles and polygons. IET Inf. Secur. 14(3): 254-265 (2020) - [j18]Milad Bahadori, Kimmo Järvinen:
A Programmable SoC-Based Accelerator for Privacy-Enhancing Technologies and Functional Encryption. IEEE Trans. Very Large Scale Integr. Syst. 28(10): 2182-2195 (2020) - [c36]Milad Bahadori, Kimmo Järvinen:
A Programmable SoC Implementation of the DGK Cryptosystem for Privacy-Enhancing Technologies. DSD 2020: 254-261 - [c35]Milad Bahadori, Kimmo Järvinen:
Compact and Programmable yet High-Performance SoC Architecture for Cryptographic Pairings. FPL 2020: 176-184
2010 – 2019
- 2019
- [j17]Zheng Yang, Kimmo Järvinen:
Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its Application. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(1): 4-22 (2019) - [c34]Kimmo Järvinen, Helena Leppäkoski, Elena Simona Lohan, Philipp Richter, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang:
PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing. EuroS&P 2019: 448-463 - [c33]Sujoy Sinha Roy, Furkan Turan, Kimmo Järvinen, Frederik Vercauteren, Ingrid Verbauwhede:
FPGA-Based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data. HPCA 2019: 387-398 - [i11]Sujoy Sinha Roy, Furkan Turan, Kimmo Järvinen, Frederik Vercauteren, Ingrid Verbauwhede:
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data. IACR Cryptol. ePrint Arch. 2019: 160 (2019) - 2018
- [j16]Kimmo Järvinen, Sujoy Sinha Roy, Ingrid Verbauwhede:
Arithmetic of $$\tau $$ τ -adic expansions for lightweight Koblitz curve cryptography. J. Cryptogr. Eng. 8(4): 285-300 (2018) - [j15]Sujoy Sinha Roy, Kimmo Järvinen, Jo Vliegen, Frederik Vercauteren, Ingrid Verbauwhede:
HEPCloud: An FPGA-Based Multicore Processor for FV Somewhat Homomorphic Function Evaluation. IEEE Trans. Computers 67(11): 1637-1650 (2018) - [c32]Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang:
Faster Privacy-Preserving Location Proximity Schemes. CANS 2018: 3-22 - [c31]Philipp Richter, Helena Leppäkoski, Elena Simona Lohan, Zheng Yang, Kimmo Järvinen, Oleksandr Tkachenko, Thomas Schneider:
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting. ICL-GNSS 2018: 1-6 - [c30]Zheng Yang, Kimmo Järvinen:
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. INFOCOM 2018: 1223-1231 - [c29]Zheng Yang, Kimmo Järvinen:
Modeling Privacy in WiFi Fingerprinting Indoor Localization. ProvSec 2018: 329-346 - [c28]Mohsin Khan, Philip Ginzboorg, Kimmo Järvinen, Valtteri Niemi:
Defeating the Downgrade Attack on Identity Privacy in 5G. SSR 2018: 95-119 - [i10]Mohsin Khan, Philip Ginzboorg, Kimmo Järvinen, Valtteri Niemi:
Defeating the Downgrade Attack on Identity Privacy in 5G. CoRR abs/1811.02293 (2018) - [i9]Zheng Yang, Kimmo Järvinen:
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. IACR Cryptol. ePrint Arch. 2018: 259 (2018) - [i8]Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang:
Faster Privacy-Preserving Location Proximity Schemes. IACR Cryptol. ePrint Arch. 2018: 694 (2018) - 2017
- [j14]Liang Chen, Sarang Thombre, Kimmo Järvinen, Elena Simona Lohan, Anette Alén-Savikko, Helena Leppäkoski, Mohammad Zahidul H. Bhuiyan, Shakila Bu-Pasha, Giorgia Nunzia Ferrara, Salomon Honkala, Jenna Lindqvist, Laura Ruotsalainen, Paivi Korpisaari, Heidi Kuusniemi:
Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey. IEEE Access 5: 8956-8977 (2017) - [j13]Zhe Liu, Johann Großschädl, Zhi Hu, Kimmo Järvinen, Husen Wang, Ingrid Verbauwhede:
Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things. IEEE Trans. Computers 66(5): 773-785 (2017) - [c27]Zhe Liu, Kimmo Järvinen, Weiqiang Liu, Hwajeong Seo:
Multiprecision Multiplication on ARMv8. ARITH 2017: 10-17 - [c26]Mohsin Khan, Kimmo Järvinen, Philip Ginzboorg, Valtteri Niemi:
On De-synchronization of User Pseudonyms in Mobile Networks. ICISS 2017: 347-366 - 2016
- [c25]Burak Gövem, Kimmo Järvinen, Kris Aerts, Ingrid Verbauwhede, Nele Mentens:
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates. AFRICACRYPT 2016: 63-83 - [c24]Kimmo Järvinen, Josep Balasch:
Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations. CARDIS 2016: 137-155 - [c23]Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa:
Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. CHES 2016: 517-537 - [c22]Jeroen Bosmans, Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede:
A Tiny Coprocessor for Elliptic Curve Cryptography over the 256-bit NIST Prime Field. VLSID 2016: 523-528 - [i7]Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa:
FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. IACR Cryptol. ePrint Arch. 2016: 569 (2016) - 2015
- [j12]Kimmo Järvinen, Vassil S. Dimitrov, Reza Azarderakhsh:
A Generalization of Addition Chains and Fast Inversions in Binary Fields. IEEE Trans. Computers 64(9): 2421-2432 (2015) - [j11]Reza Azarderakhsh, Mehran Mozaffari Kermani, Kimmo Järvinen:
Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic Applications. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(3): 332-340 (2015) - [c21]Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede:
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates. CHES 2015: 102-122 - [c20]Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede:
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. CHES 2015: 164-184 - [i6]Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede:
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. IACR Cryptol. ePrint Arch. 2015: 337 (2015) - [i5]Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede:
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates. IACR Cryptol. ePrint Arch. 2015: 556 (2015) - 2014
- [j10]Reza Azarderakhsh, Kimmo Järvinen, Vassil S. Dimitrov:
Fast Inversion in ${\schmi{GF(2^m)}}$ with Normal Basis Using Hybrid-Double Multipliers. IEEE Trans. Computers 63(4): 1041-1047 (2014) - [j9]Reza Azarderakhsh, Kimmo U. Järvinen, Mehran Mozaffari Kermani:
Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications. IEEE Trans. Circuits Syst. I Regul. Pap. 61-I(4): 1144-1155 (2014) - [c19]Kimmo Järvinen, Ingrid Verbauwhede:
How to Use Koblitz Curves on Small Devices? CARDIS 2014: 154-170 - 2013
- [c18]Vassil S. Dimitrov, Kimmo Järvinen:
Another Look at Inversions over Binary Fields. IEEE Symposium on Computer Arithmetic 2013: 211-218 - [c17]Simon Hoerder, Kimmo Järvinen, Daniel Page:
On Secure Embedded Token Design. WISTP 2013: 112-128 - [i4]Simon Hoerder, Kimmo Järvinen, Dan Page:
On secure embedded token design (Long Version) - Quasi-looped Yao circuits and bounded leakage. IACR Cryptol. ePrint Arch. 2013: 168 (2013) - 2012
- [j8]Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Daniel Page, Stefan Tillich, Marcin Wójcik:
An exploration of mechanisms for dynamic cryptographic instruction set extension. J. Cryptogr. Eng. 2(1): 1-18 (2012) - [j7]Jithra Adikari, Vassil S. Dimitrov, Kimmo U. Järvinen:
A Fast Hardware Architecture for Integer to \tauNAF Conversion for Koblitz Curves. IEEE Trans. Computers 61(5): 732-737 (2012) - [c16]Kimmo Järvinen, Céline Blondeau, Dan Page, Michael Tunstall:
Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes. FDTC 2012: 72-82 - [e1]Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg:
Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers. Lecture Notes in Computer Science 7127, Springer 2012, ISBN 978-3-642-27936-2 [contents] - 2011
- [j6]Kimmo Järvinen:
Optimized FPGA-based elliptic curve cryptography processor for high-speed applications. Integr. 44(4): 270-279 (2011) - [j5]Vassil S. Dimitrov, Kimmo U. Järvinen, Jithra Adikari:
Area-Efficient Multipliers Based on Multiple-Radix Representations. IEEE Trans. Computers 60(2): 189-201 (2011) - [c15]Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Dan Page, Stefan Tillich, Marcin Wójcik:
An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension. CHES 2011: 1-16 - 2010
- [j4]Billy Bob Brumley, Kimmo U. Järvinen:
Conversion Algorithms and Implementations for Koblitz Curve Cryptography. IEEE Trans. Computers 59(1): 81-92 (2010) - [c14]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). CHES 2010: 383-397 - [c13]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Embedded SFE: Offloading Server and Network Using Hardware Tokens. Financial Cryptography 2010: 207-221 - [p1]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). Towards Hardware-Intrinsic Security 2010: 367-386 - [i3]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs. IACR Cryptol. ePrint Arch. 2010: 276 (2010)
2000 – 2009
- 2009
- [j3]Kimmo U. Järvinen, Jorma Skyttä:
Fast point multiplication on Koblitz curves: Parallelization method and implementations. Microprocess. Microsystems 33(2): 106-116 (2009) - [c12]Kimmo U. Järvinen:
On Repeated Squarings in Binary Fields. Selected Areas in Cryptography 2009: 331-349 - [i2]Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Embedded SFE: Offloading Server and Network using Hardware Tokens. IACR Cryptol. ePrint Arch. 2009: 591 (2009) - 2008
- [j2]Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., W. F. Chan, Zhun Huang:
Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation. IEEE Trans. Computers 57(11): 1469-1481 (2008) - [j1]Kimmo U. Järvinen, Jorma Skyttä:
On Parallelization of High-Speed Processors for Elliptic Curve Cryptography. IEEE Trans. Very Large Scale Integr. Syst. 16(9): 1162-1175 (2008) - [c11]Billy Bob Brumley, Kimmo U. Järvinen:
Fast Point Decompression for Standard Elliptic Curves. EuroPKI 2008: 134-149 - [c10]Kimmo U. Järvinen, Jorma O. Skyttä:
High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves. FCCM 2008: 109-118 - 2007
- [c9]Kimmo U. Järvinen, Juha Forsten, Jorma Skyttä:
FPGA Design of Self-certified Signature Verification on Koblitz Curves. CHES 2007: 256-271 - [c8]Billy Bob Brumley, Kimmo U. Järvinen:
Koblitz Curves and Integer Equivalents of Frobenius Expansions. Selected Areas in Cryptography 2007: 126-137 - 2006
- [c7]Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., W. F. Chan, Zhun Huang:
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers. CHES 2006: 445-459 - [c6]Kimmo Järvinen, Juha Forsten, Jorma Skyttä:
Efficient Circuitry for Computing τ-adic Non-Adjacent Form. ICECS 2006: 232-235 - [i1]Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., W. F. Chan, Zhun Huang:
Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation. IACR Cryptol. ePrint Arch. 2006: 305 (2006) - 2005
- [c5]Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä:
A Compact MD5 and SHA-1 Co-Implementation Utilizing Algorithm Similarities. ERSA 2005: 48-54 - [c4]Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä:
Hardware Implementation Analysis of the MD5 Hash Algorithm. HICSS 2005 - 2004
- [c3]Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä:
A VHDL Generator for Elliptic Curve Cryptography. FPL 2004: 1098-1100 - [c2]Kimmo Järvinen, Matti Tommiska, Jorma Skyttä:
A scalable architecture for elliptic curve point multiplication. FPT 2004: 303-306 - 2003
- [c1]Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä:
A fully pipelined memoryless 17.8 Gbps AES-128 encryptor. FPGA 2003: 207-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint