Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A trojan framework in AES core to evade state-of-the-art HT detection schemes., , , , , , and . Microelectron. J., (2021)Characterization of Non-linear Cellular Automata Model for Pattern Recognition., , , , and . AFSS, volume 2275 of Lecture Notes in Computer Science, page 214-220. Springer, (2002)Counting Cycles in Reversible Cellular Automata., , and . ACRI, volume 7495 of Lecture Notes in Computer Science, page 11-19. Springer, (2012)Cellular Automata Evolution for Distributed Data Mining., , and . ACRI, volume 3305 of Lecture Notes in Computer Science, page 40-49. Springer, (2004)Evolving Cellular Automata Based Associative Memory for Pattern Recognition., , , , and . HiPC, volume 2228 of Lecture Notes in Computer Science, page 115-124. Springer, (2001)Design of low power 5-input majority voter in quantum-dot cellular automata with effective error resilience., , and . ISED, page 101-105. IEEE, (2016)High Speed Hardware for March C¯., , and . ISED, page 145-147. IEEE, (2012)Design of Fault Tolerant Universal Logic in QCA., , , and . ISED, page 166-170. IEEE Computer Society, (2014)Characterization of Non-reachable States in Irreversible CAState Space., and . ACRI, volume 5191 of Lecture Notes in Computer Science, page 160-167. Springer, (2008)An Efficient Test Design for CMPs Cache Coherence Realizing MESI Protocol., and . VDAT, volume 7373 of Lecture Notes in Computer Science, page 89-98. Springer, (2012)