From post

Exploration of Benes Network in Cryptographic Processors: A Random Infection Countermeasure for Block Ciphers Against Fault Attacks.

, , , , , , и . IEEE Trans. Inf. Forensics Secur., 12 (2): 309-322 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hedging American contingent claims with constrained portfolios under proportional transaction costs, и . Chaos, Solitons & Fractals, 23 (4): 1153--1162 (февраля 2005)Formalization Modeling of Maintenance Based on Agent., , , и . HCI (29), том 713 из Communications in Computer and Information Science, стр. 575-582. Springer, (2017)Amplitude-adaptive spread-spectrum data embedding., , , , и . IET Image Processing, 10 (2): 138-148 (2016)Laser Printer Source Forensics for Arbitrary Chinese Characters., , , , и . Security and Management, стр. 356-360. CSREA Press, (2010)Automatic Detection of Cross-Shaped Targets for Laser Scan Registration., , , , , , и . IEEE Access, (2018)Tensor Completion Using Spectral $(k, p)$ -Support Norm., , , и . IEEE Access, (2018)Fully integrated passive UHF RFID transponder IC with a sensitivity of -12 dBm., , , , , , , и . ISCAS, стр. 289-292. IEEE, (2013)A super-regenerative pulsed UWB receiver combined with injection-locking., , , , , , и . ISCAS, стр. 1584-1587. IEEE, (2013)A Service-Based Hierarchical Architecture for Parallel Computing in Grid Environment., , , , и . GCC (1), том 3032 из Lecture Notes in Computer Science, стр. 641-644. Springer, (2003)A novel programmable pulse-broadening time amplifier controlled by node capacitance., , , , и . ASICON, стр. 199-202. IEEE, (2017)