Author of the publication

Pseudo random number generator and Hash function for embedded microprocessors.

, , , , and . WF-IoT, page 37-40. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction of efficient and secure pairing algorithm and its application., , and . J. Commun. Networks, 10 (4): 437-443 (2008)An enhanced LBS security protocol in wireless networks., , , and . IGARSS, page 1594-1597. IEEE, (2005)A Survivability Model for Cluster System Under DoS Attacks., , , , and . HPCC, volume 3726 of Lecture Notes in Computer Science, page 567-572. Springer, (2005)Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA., , and . FDSE, volume 8860 of Lecture Notes in Computer Science, page 191-203. Springer, (2014)Parallel Implementation of Simeck Family Block Cipher by Using ARM NEON., , , and . ICUFN, page 703-707. IEEE, (2018)Optimization of CHAM Encryption Algorithm Based on Javascript., , , and . ICUFN, page 774-778. IEEE, (2018)Parallel Implementations of CHAM., , , , , and . WISA, volume 11402 of Lecture Notes in Computer Science, page 93-104. Springer, (2018)ARM/NEON Co-design of Multiplication/Squaring., , , , and . WISA, volume 10763 of Lecture Notes in Computer Science, page 72-84. Springer, (2017)Classification performance using gated recurrent unit recurrent neural network on energy disaggregation., , and . ICMLC, page 105-110. IEEE, (2016)Construction of Efficient and Secure Pairing Algorithm and its Application., , and . IACR Cryptol. ePrint Arch., (2007)