Author of the publication

A Methodology for Speeding Up Fast Fourier Transform Focusing on Memory Architecture Utilization.

, , , , , and . IEEE Trans. Signal Process., 59 (12): 6217-6226 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolution of the e-Museum Concept through Exploitation of Cryptographic Algorithms., , , and . EuroMed, volume 7616 of Lecture Notes in Computer Science, page 291-300. Springer, (2012)Throughput Optimization of the Cipher Message Authentication Code., , , and . DSP, page 495-498. IEEE, (2007)High-performance FPGA implementations of the cryptographic hash function JH., , , and . IET Comput. Digit. Tech., 7 (1): 29-40 (2013)High performance pipelined FPGA implementation of the SHA-3 hash algorithm., , and . MECO, page 68-71. IEEE, (2015)High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach., , , , , and . SECRYPT, page 126-135. SciTePress, (2012)Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis., , and . CS2@HiPEAC, page 13-18. ACM, (2015)Hardware implementation of the Totally Self-Checking SHA-256 hash core., , , , and . EUROCON, page 1-5. IEEE, (2015)Design and validation of an agent-based driving simulator., , , and . SummerSim, page 6:1-6:12. ACM, (2018)Cipher Block Based Authentication Module: a Hardware Design Perspective., , , , and . J. Circuits Syst. Comput., 20 (2): 163-184 (2011)Distribution of Cultural Content through Exploitation of Cryptographic Algorithms and Hardware Identification., , , , , and . EuroMed, volume 8740 of Lecture Notes in Computer Science, page 156-165. Springer, (2014)