Author of the publication

Secure evolutionary hardware for public-key cryptosystems.

, and . IEEE Congress on Evolutionary Computation, page 2130-2137. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Ray Tracing for Underwater Acoustic Predictions., , and . ICCSA (1), volume 10404 of Lecture Notes in Computer Science, page 43-55. Springer, (2017)A Versatile Pipelined Hardware Implementation for Encryption and Decryption Using Advanced Encryption Standard., and . VECPAR, volume 4395 of Lecture Notes in Computer Science, page 249-259. Springer, (2006)Wave algorithm applied to collective navigation of robotic swarms., and . Appl. Soft Comput., (2017)Minimal Deterministic Left-to-Right Pattern-Matching Automata.. ACM SIGPLAN Notices, 33 (1): 40-47 (1998)Efficient Concise Deterministic Pattern-Matching Automata for Ambiguous Patterns., and . ACM SIGPLAN Notices, 37 (2): 57-67 (2002)Evolutionary multi-objective optimisation: a survey., and . Int. J. Bio Inspired Comput., 7 (1): 1-25 (2015)Embedded implementation of template matching using correlation and particle swarm optimisation., , and . Int. J. Bio Inspired Comput., 11 (2): 102-109 (2018)Simultaneous localization and mapping using swarm intelligence based methods., , and . Expert Syst. Appl., (2020)Review of methodologies and tasks in swarm robotics towards standardization., and . Swarm Evol. Comput., (2019)Hardware reuse in modern application-specific processors and accelerators., , , , , and . Microprocess. Microsystems, 37 (6-7): 684-692 (2013)