Author of the publication

Secure evolutionary hardware for public-key cryptosystems.

, and . IEEE Congress on Evolutionary Computation, page 2130-2137. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simultaneous localization and mapping using swarm intelligence based methods., , and . Expert Syst. Appl., (2020)Evolutionary multi-objective optimisation: a survey., and . Int. J. Bio Inspired Comput., 7 (1): 1-25 (2015)Embedded implementation of template matching using correlation and particle swarm optimisation., , and . Int. J. Bio Inspired Comput., 11 (2): 102-109 (2018)Improving Space, Time, and Termination in Rewriting-Based Programming., and . IEA/AIE, volume 2070 of Lecture Notes in Computer Science, page 880-890. Springer, (2001)Hardware Architecture for Genetic Algorithms., and . IEA/AIE, volume 3533 of Lecture Notes in Computer Science, page 554-556. Springer, (2005)Automatic Adaptive Modeling of Fuzzy Systems Using Particle Swarm Optimization., , and . Trans. Comput. Sci., (2010)Efficient mapping of an image processing application for a network-on-chip based implementation., , and . Int. J. High Perform. Syst. Archit., 2 (1): 46-57 (2009)Efficient Concise Deterministic Pattern-Matching Automata for Ambiguous Patterns., and . ACM SIGPLAN Notices, 37 (2): 57-67 (2002)Embedded cryptographic hardware., and . J. Syst. Archit., 53 (2-3): 69-71 (2007)Fast reconfigurable systolic hardware for modular multiplication and exponentiation., and . J. Syst. Archit., 49 (7-9): 387-396 (2003)