Author of the publication

Timing Side-Channel Attack Resistant Key Derivation Functions for Cryptosystems.

, and . iSES, page 395-399. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mathematical Model for the Depletion of forestry Resources due to Population and Population pressure Augmented Industrialization., , and . Int. J. Model. Simul. Sci. Comput., 5 (1): 1350022 (2014)Mention detection in coreference resolution: survey., , and . Appl. Intell., 52 (9): 9816-9860 (2022)Hardware Software Co-design framework for Data Encryption in Image Processing Systems for the Internet of Things Environmen., , and . CoRR, (2021)Formal Verification of Full-Wave Rectifier: A Case Study, and . CoRR, (2009)Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT., and . Secur. Priv., (2022)Low-leakage and process-variation-tolerant write-read disturb-free 9T SRA cell using CMOS and FinFETs., and . ISQED, page 205-210. IEEE, (2016)Enhancing Privacy-Preserving Brain Tumor Detection in Medical Cyber-Physical Systems through Deep Learning Algorithms., , , , and . iSES, page 180-185. IEEE, (2023)Hardware Software Co-Simulation of an AES-128 based Data Encryption in Image Processing Systems for the Internet of Things Environment., and . iSES, page 260-264. IEEE, (2020)Hardware Software Co-Simulation of Obfuscated 128-Bit AES Algorithm for Image Processing Applications., and . iSES, page 191-194. IEEE, (2018)FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis., and . Cryptogr., 7 (4): 55 (September 2023)