Author of the publication

Prediction of Binary Sequences by Evolving Finite State Machines.

, , and . Artificial Evolution, volume 2310 of Lecture Notes in Computer Science, page 42-53. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AES side-channel countermeasure using random tower field constructions., , and . Des. Codes Cryptogr., 69 (3): 331-349 (2013)Prediction of Binary Sequences by Evolving Finite State Machines., , and . Artificial Evolution, volume 2310 of Lecture Notes in Computer Science, page 42-53. Springer, (2001)Secure time-stamping schemes: a distributed point of view., , , and . Ann. des Télécommunications, 61 (5-6): 662-681 (2006)Asymptotic formulas for partitions with bounded multiplicity., and . Applied Algebra and Number Theory, Theory, Cambridge University Press, (2014)Voltage Spikes on the Substrate to Obtain Timing Faults., , , , and . DSD, page 483-486. IEEE Computer Society, (2013)Efficient Integrated Circuits Characterization Through Computer Vision Assistance., , , , , and . ETFA, page 1247-1250. IEEE, (2020)Random Euclidean Addition Chain Generation and Its Application to Point Multiplication., , , , and . INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 238-261. Springer, (2010)On Statistical Testing of Random Numbers Generators., , , and . SCN, volume 4116 of Lecture Notes in Computer Science, page 271-287. Springer, (2006)Collision Based Attacks in Practice., , , and . DSD, page 367-374. IEEE Computer Society, (2015)Leak Resistant Arithmetic., , , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 62-75. Springer, (2004)