Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covering radius - Survey and recent results., , , and . IEEE Trans. Inf. Theory, 31 (3): 328-343 (1985)Minimal Sets of Turns for Breaking Cycles in Graphs Modeling Networks., , and . IEEE Trans. Parallel Distributed Syst., 21 (9): 1342-1353 (2010)Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection., , and . FDTC, volume 4236 of Lecture Notes in Computer Science, page 185-195. Springer, (2006)Non-linear Residue Codes for Robust Public-Key Arithmetic., , and . FDTC, volume 4236 of Lecture Notes in Computer Science, page 173-184. Springer, (2006)Detecting bridging and stuck-at faults at input and output pins of standard digital components., and . DAC, page 494-505. ACM/IEEE, (1980)Signature Testability of PLA., , and . FPL, volume 849 of Lecture Notes in Computer Science, page 335-337. Springer, (1994)Aliasing Probability for Multiple Input Signature Analyzer., , and . IEEE Trans. Computers, 39 (4): 586-591 (1990)Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard., , and . J. Syst. Archit., 53 (2-3): 139-149 (2007)Pseudo-exhaustive word-oriented DRAM testing., , and . ED&TC, page 126-132. IEEE Computer Society, (1995)An Automated Fine-Grain Pipelining Using Domino Style Asynchronous Library., , , and . ACSD, page 68-76. IEEE Computer Society, (2005)