Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Quantum Circuits for Modular Exponentiation., , and . VLSID, page 407-412. IEEE, (2019)Efficient QR Decomposition Using Low Complexity Column-wise Givens Rotation (CGR)., , , , , and . VLSID, page 258-263. IEEE Computer Society, (2014)Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study., , , and . VLSID, page 398-403. IEEE Computer Society, (2018)Floating Point Multiplication Mapping on ReRAM Based In-memory Computing Architecture., , , and . VLSID, page 439-444. IEEE Computer Society, (2018)EvoDeb: Debugging Evolving Hardware Designs., , and . VLSID, page 481-486. IEEE Computer Society, (2015)A low overhead error confinement method based on application statistical characteristics., , and . DATE, page 1168-1171. IEEE, (2016)Scalable and energy-efficient reconfigurable accelerator for column-wise givens rotation., , , , and . VLSI-SoC, page 1-6. IEEE, (2014)Analysis and Improvement of Transformation-Based Reversible Logic Synthesis., , , and . ISMVL, page 47-52. IEEE Computer Society, (2013)Enabling Efficient Mapping of XMG-Synthesized Networks to Spintronic Hardware., and . ISCAS, page 1-5. IEEE, (2020)Authentication Protocol for Secure Automotive Systems: Benchmarking Post-Quantum Cryptography., , , , and . ISCAS, page 1-5. IEEE, (2020)