Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multilevel Threshold Based Gray Scale Image Segmentation using Cuckoo Search., , , , and . CoRR, (2013)BIP32-Compatible Threshold Wallets., , , , and . IACR Cryptol. ePrint Arch., (2023)The Exact Security of BIP32 Wallets., , , , and . CCS, page 1020-1042. ACM, (2021)LILLIPUT: a lightweight low-latency lookup-table decoder for near-term Quantum error correction., , and . ASPLOS, page 541-553. ACM, (2022)EQUAL: Improving the Fidelity of Quantum Annealers by Injecting Controlled Perturbations., , , and . QCE, page 516-527. IEEE, (2022)Analysis of Handwritten Signature Image., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)ERASER: Towards Adaptive Leakage Suppression for Fault-Tolerant Quantum Computing., , and . MICRO, page 509-525. ACM, (2023)Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies., , , and . IACR Cryptol. ePrint Arch., (2023)Shared-Custodial Password-Authenticated Deterministic Wallets., , and . SCN (2), volume 14974 of Lecture Notes in Computer Science, page 338-359. Springer, (2024)A Secure Scheme for Image Transformation., , , , and . SNPD, page 490-493. IEEE Computer Society, (2008)