Author of the publication

A Secure Framework for User-Key Provisioning to SGX Enclaves.

, , , , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 725-732. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel Deception Techniques for Malware Detection on Industrial Control Systems., , , and . J. Inf. Process., (2021)A Method for Guaranteeing End-to-End Delay by Mutual Cooperation between IP Routers., , , , and . LCN, page 511-512. IEEE Computer Society, (2005)Evaluation of Latch-Based PUFs Implemented on 40 nm ASICs., , and . CANDAR, page 642-648. IEEE Computer Society, (2016)A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs., , , , , , and . J. Cryptographic Engineering, 5 (3): 187-199 (2015)ASIC implementation of random number generators using SR latches and its evaluation., , , , , and . EURASIP J. Information Security, (2016)Compact Architecture for ASIC and FPGA Implementation of the KASUMI Block Cipher., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (12): 2628-2638 (2011)A Very Compact Hardware Implementation of the MISTY1 Block Cipher., , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 315-330. Springer, (2008)Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis., , , and . FedCSIS, volume 2 of Annals of Computer Science and Information Systems, page 911-918. (2014)Evaluation of ASIC Implementation of Physical Random Number Generators Using RS Latches., , , , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 3-15. Springer, (2013)Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (1): 118-129 (2016)