Author of the publication

Optimized Schoolbook Polynomial Multiplication for Compact Lattice-Based Cryptography on FPGA.

, , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (10): 2459-2463 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method., , , and . IEEE Access, (2019)A Hardware/Software Co-Design Methodology for Adaptive Approximate Computing in clustering and ANN Learning., , , , and . IEEE Open J. Comput. Soc., (2021)Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks., , , , , , , and . IEEE Trans. Emerg. Top. Comput., 11 (1): 153-169 (January 2023)Guest Editorial: Introduction to the Special Issue on Emerging Technologies and Designs for Application-Specific Computing., , and . IEEE Trans. Emerg. Top. Comput., 5 (2): 148-150 (2017)AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption., , , , and . IEEE Trans. Emerg. Top. Comput., 11 (3): 664-678 (July 2023)Optimized Schoolbook Polynomial Multiplication for Compact Lattice-Based Cryptography on FPGA., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (10): 2459-2463 (2019)Deep learning based sferics recognition for AMT data processing in the dead band., , , , , and . CoRR, (2022)3D Invisible Cloak., , , , , and . CoRR, (2020)Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations., , , , , and . CoRR, (2021)Spice-Compatible Modeling of Double Barrier MTJ for Highly Reliable Circuits., , , , , and . ICTA, page 65-66. IEEE, (2023)