Author of the publication

Alternative application-specific processor architectures for fast arbitrary bit permutations.

, , and . Int. J. Embed. Syst., 3 (4): 219-228 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for testing hardware-software security architectures., , , and . ACSAC, page 387-397. ACM, (2010)Processor Architecture for Trustworthy Computers.. Asia-Pacific Computer Systems Architecture Conference, volume 3740 of Lecture Notes in Computer Science, page 1-2. Springer, (2005)Subword parallelism with MAX-2.. IEEE Micro, 16 (4): 51-59 (1996)Guest Editorial: Media processing: a new design target., and . IEEE Micro, 16 (4): 6-9 (1996)Integration of butterfly and inverse butterfly nets in embedded processors: Effects on power saving., , , , and . ACSCC, page 1457-1459. IEEE, (2012)How Bad is Suboptimal Rate Allocation?, , , and . INFOCOM, page 321-325. IEEE, (2008)Rapid single-chip secure processor prototyping on the OpenSPARC FPGA platform., , , , , , , and . International Symposium on Rapid System Prototyping, page 38-44. IEEE, (2011)Security basics.. Hot Chips Symposium, page 1-32. IEEE, (2014)Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health., and . IEEE Trans. Computers, 67 (6): 799-815 (2018)Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems., , and . IEEE Internet Things J., 8 (12): 9706-9716 (2021)