Author of the publication

A Method of Generating Highly Efficient String Matching Circuit for Intrusion Detection.

, , , and . FPL, page 1-4. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pseudo-LFSR PUF: A Compact, Efficient and Reliable Physical Unclonable Function., , , and . ReConFig, page 223-228. IEEE Computer Society, (2011)Multiplication-Free Lookup-Based CNN Accelerator Using Residual Vector Quantization and Its FPGA Implementation., , , and . IEEE Access, (2024)Enhanced Correlation Power Analysis Using Key Screening Technique., , , , and . ReConFig, page 403-408. IEEE Computer Society, (2008)Prototype of USB stick-sized PUF module for authentication and key generation., , and . GCCE, page 1-2. IEEE, (2017)Implementation of pseudo-linear feedback shift register-based physical unclonable functions on silicon and sufficient Challenge-Response pair acquisition using Built-In Self-Test before shipping., , , , , , and . Integr., (2020)Energy and area saving effect of Dynamic Partial Reconfiguration on a 28-nm process FPGA., , and . GCCE, page 217-218. IEEE, (2013)Circuit Simulation for Fault Sensitivity Analysis and Its Application to Cryptographic LSI., , and . FDTC, page 16-23. IEEE Computer Society, (2012)A fast power current analysis methodology using capacitor charging model for side channel attack evaluation., , , , , and . HOST, page 87-92. IEEE Computer Society, (2011)Hardware Implementations of Hash Function Luffa., , , , and . HOST, page 130-134. IEEE Computer Society, (2010)A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme., , , and . SECITC, volume 12001 of Lecture Notes in Computer Science, page 78-94. Springer, (2019)