Author of the publication

A class of two-dimensional cellular automata and their applications in random pattern testing.

, , and . J. Electron. Test., 5 (1): 67-82 (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCARAB: A continuous authentication scheme for biomedical application., and . PST, page 361-367. IEEE, (2016)On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES., , , and . ATIS, volume 719 of Communications in Computer and Information Science, page 58-72. Springer, (2017)Deep Learning Based Differential Classifier of PRIDE and RC5., , , and . ATIS, volume 1804 of Communications in Computer and Information Science, page 46-58. Springer, (2022)Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2)., , and . SECRYPT, page 540-547. SCITEPRESS, (2022)A GF(p) elliptic curve group operator resistant against side channel attacks., , , and . ACM Great Lakes Symposium on VLSI, page 53-58. ACM, (2008)Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks., , , and . VDAT, volume 7373 of Lecture Notes in Computer Science, page 370-372. Springer, (2012)High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields., , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 442-458. Springer, (2011)Randomized Batch Verification of Standard ECDSA Signatures., , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 237-255. Springer, (2014)Achieving Better Security Using Nonlinear Cellular Automata as a Cryptographic Primitive., and . ICMC, volume 834 of Communications in Computer and Information Science, page 3-15. Springer, (2018)CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata., , and . J. Cell. Autom., 7 (2): 179-197 (2012)