Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Throughput Optimization of the Cipher Message Authentication Code., , , and . DSP, page 495-498. IEEE, (2007)RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems., , , , , , , , , and 8 other author(s). DATE, page 388-393. IEEE, (2020)13.2 A 3.7mW-RX 4.4mW-TX fully integrated Bluetooth Low-Energy/IEEE802.15.4/proprietary SoC with an ADPLL-based fast frequency offset compensation in 40nm CMOS., , , , , , , , , and 8 other author(s). ISSCC, page 1-3. IEEE, (2015)RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems., , , , , , , , , and 8 other author(s). CoRR, (2019)Sub-meter UWB localization: Low complexity design and evaluation in a real localization system., , , , , and . PIMRC, page 186-191. IEEE, (2013)Long-term Continuous Assessment of SRAM PUF and Source of Random Numbers., , , and . DATE, page 7-12. IEEE, (2020)Modeling Static Noise Margin for FinFET based SRAM PUFs., , , , , and . ETS, page 1-6. IEEE, (2020)Cipher Block Based Authentication Module: a Hardware Design Perspective., , , , and . J. Circuits Syst. Comput., 20 (2): 163-184 (2011)High performance cryptographic engine PANAMA: hardware implementation., , and . ICECS, page 575-578. IEEE, (2004)Exploration of cryptographic ASIP designs for wireless sensor nodes., , , , , , and . ICECS, page 827-830. IEEE, (2010)