Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting first-order leakages against the tower field masking scheme., and . CITS, page 1-5. IEEE, (2016)Attention-based Efficient Lightweight Model for Accurate Real-Time Face Verification on Embedded Device., , , , and . ICCCS, page 385-392. IEEE, (2021)Efficient polynomial multiplier architecture for Ring-LWE based public key cryptosystems., and . ISCAS, page 1162-1165. IEEE, (2016)A Novel Relative Frequency Based Ring Oscillator Physical Unclonable Function., and . CSE, page 569-575. IEEE Computer Society, (2014)An efficient method for integer factorization., and . ISCAS, page 73-76. IEEE, (2015)A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography., and . TrustCom/BigDataSE/ISPA (1), page 392-399. IEEE, (2015)Exploring the speed limit of SM2., and . CCIS, page 456-460. IEEE, (2014)Stability Conditions for Discrete Hopfield Neural Networks with Delay., and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 476-481. Springer, (2006)A Novel Technique for Ring Oscillator Based PUFs to Enroll Stable Challenge Response Pairs., and . CIT, page 270-275. IEEE Computer Society, (2014)Strategy of Relations Collection in Factoring RSA Modulus., and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 199-211. Springer, (2015)