From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security of Block Ciphers - From Algorithm Design to Hardware Implementation., , и . Wiley, (2015)A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications., , и . RFIDSec Asia, том 11 из Cryptology and Information Security Series, стр. 83-94. IOS Press, (2013)An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis., , , , , и . GCCE, стр. 176-180. IEEE, (2020)Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks., , , и . ACNS Workshops, том 12418 из Lecture Notes in Computer Science, стр. 181-197. Springer, (2020)Validating the DFA Attack Resistance of AES (Short Paper)., , , и . FPS, том 12056 из Lecture Notes in Computer Science, стр. 371-378. Springer, (2019)Towards Verifying Physical Assumption in Card-Based Cryptography., , и . SecITC, том 13809 из Lecture Notes in Computer Science, стр. 289-305. Springer, (2022)Finding the best system design flow for a high-speed JPEG encoder., , и . ASP-DAC, стр. 577-578. ACM, (2003)Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678., , и . WISA, том 10763 из Lecture Notes in Computer Science, стр. 261-273. Springer, (2017)Embedded Software Integration for Coarse-Grain Reconfigurable Systems., , , и . IPDPS, IEEE Computer Society, (2004)Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor., , , , и . FPL, стр. 1-6. IEEE, (2006)