From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep Learning Techniques for Side-Channel Analysis on AES Datasets Collected from Hardware and Software Platforms., и . SAMOS, том 13227 из Lecture Notes in Computer Science, стр. 300-316. Springer, (2021)A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications., и . RFIDSec, том 6370 из Lecture Notes in Computer Science, стр. 258-269. Springer, (2010)A Power Reduction Technique Based on Linear Transformations for Block Ciphers.. VLSI-SoC, стр. 1-6. IEEE, (2022)Resource-efficient cryptography for ubiquitous computing.. Ruhr University Bochum, (2015)A Survey on Authenticated Encryption - ASIC Designer's Perspective., , и . IACR Cryptology ePrint Archive, (2019)PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning., , , , , и . CoRR, (2022)A Survey on Authenticated Encryption-ASIC Designer's Perspective., , и . ACM Comput. Surv., 50 (6): 88:1-88:21 (2018)Analyzing ModuloNET Against Transition Effects., и . COINS, стр. 1-6. IEEE, (2023)A reconfigurable architecture for searching optimal software code to implement block cipher permutation matrices., , и . ReConFig, стр. 1-8. IEEE, (2013)Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond., , , , , , и . ICISSP, стр. 583-591. SciTePress, (2023)