Author of the publication

On Permutation Operations in Cipher Design.

, , , , and . ITCC (2), page 569-577. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rapid single-chip secure processor prototyping on the OpenSPARC FPGA platform., , , , , , , and . International Symposium on Rapid System Prototyping, page 38-44. IEEE, (2011)Subword parallelism with MAX-2.. IEEE Micro, 16 (4): 51-59 (1996)Guest Editorial: Media processing: a new design target., and . IEEE Micro, 16 (4): 6-9 (1996)A framework for testing hardware-software security architectures., , , and . ACSAC, page 387-397. ACM, (2010)Processor Architecture for Trustworthy Computers.. Asia-Pacific Computer Systems Architecture Conference, volume 3740 of Lecture Notes in Computer Science, page 1-2. Springer, (2005)Integration of butterfly and inverse butterfly nets in embedded processors: Effects on power saving., , , , and . ACSCC, page 1457-1459. IEEE, (2012)How Bad is Suboptimal Rate Allocation?, , , and . INFOCOM, page 321-325. IEEE, (2008)Security basics.. Hot Chips Symposium, page 1-32. IEEE, (2014)Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems., , and . IEEE Internet Things J., 8 (12): 9706-9716 (2021)Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health., and . IEEE Trans. Computers, 67 (6): 799-815 (2018)