Author of the publication

Domain Specific Tools and Methods for Application in Security Processor Design.

, and . Des. Autom. Embed. Syst., 7 (4): 365-383 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unlocking the design secrets of a 2.29 Gb/s Rijndael processor., , and . DAC, page 634-639. ACM, (2002)Inducing local timing fault through EM injection., , , , , and . DAC, page 142:1-142:6. ACM, (2018)Physical unclonable function and true random number generator: a compact and scalable implementation., , , and . ACM Great Lakes Symposium on VLSI, page 425-428. ACM, (2009)A flexible design flow for software IP binding in commodity FPGA., , and . SIES, page 211-218. IEEE, (2009)Secure Application Continuity in Intermittent Systems., , , and . IGSC, page 1-8. IEEE, (2018)Digital fingerprints for low-cost platforms using MEMS sensors., , , , and . WESS, page 2:1-2:6. ACM, (2013)Low Power Digital Frequency Conversion Architectures., , , and . J. VLSI Signal Process., 18 (2): 187-197 (1998)Virtual Java/FPGA interface for networked reconfiguration., , , , , , and . ASP-DAC, page 558-563. ACM, (2001)A software-hardware emulator for sensor networks., , , , , and . SECON, page 440-448. IEEE, (2011)Simulating power/energy consumption of sensor nodes with flexible hardware in wireless networks., , , and . SECON, page 112-120. IEEE, (2012)