Author of the publication

Hardware Implementation of an Additive Bit-Serial Algorithm for the Discrete Logarithm Modulo 2k.

, , , and . ISVLSI, page 130-135. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach., , , , and . Inf. Sci., (2020)面向时间感知的微博传播模型研究 (Research on Temporal Perception-oriented Microblog Propagation Model)., , , and . 计算机科学, 44 (2): 275-278 (2017)Blind Transmission and Detection Designs With Unique Identification and Full Diversity for Noncoherent Two-Way Relay Networks., , and . IEEE Trans. Veh. Technol., 63 (7): 3137-3146 (2014)A Data-Driven Approach for GPS Trajectory Data Cleaning., , , and . DASFAA (1), volume 12112 of Lecture Notes in Computer Science, page 3-19. Springer, (2020)Indentifying Disease Genes Using Disease-Specific Amino Acid Usage., , and . ICIC (3), volume 6840 of Lecture Notes in Computer Science, page 478-485. Springer, (2011)Virtual Prototype of the Tunnel Boring Machine and Movement Simulation in DIVISION MOCKUP2000i2., , , , and . DET, volume 66 of Advances in Intelligent and Soft Computing, page 525-532. Springer, (2009)DETransMVSnet: Research on Terahertz 3D Reconstruction of Multi-View Stereo Network With Deep Equilibrium Transformers., , , and . IEEE Access, (2023)Methodological frameworks for large-scale network analysis and design., , and . Comput. Commun. Rev., 34 (3): 7-20 (2004)Optimization model of internet protocols., , , , and . SIGMETRICS, page 277. ACM, (2005)Resource Allocation for D2D Communication Underlaying Cellular Network., , , , , , and . ICAIS (1), volume 13338 of Lecture Notes in Computer Science, page 94-106. Springer, (2022)