Author of the publication

Single-Round Pattern Matching Key Generation Using Physically Unclonable Function.

, , , , and . Secur. Commun. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Taxonomical Security Consideration of OAEP Variants., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (5): 1233-1245 (2006)Single-Round Pattern Matching Key Generation Using Physically Unclonable Function., , , , and . Secur. Commun. Networks, (2019)Analysis of Information Leakage Due to Operative Errors in Card-Based Protocols., and . IWOCA, volume 10979 of Lecture Notes in Computer Science, page 250-262. Springer, (2018)Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation., and . CRYPTO, volume 2729 of Lecture Notes in Computer Science, page 366-382. Springer, (2003)Taxonomic Consideration to OAEP Variants and Their Security., and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 105-117. Springer, (2004)A new model of Client-Server Communications under information theoretic security., , , and . ITW, page 511-515. IEEE, (2014)Built-in Determined Sub-key Correlation Power Analysis., , and . IACR Cryptology ePrint Archive, (2009)Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic., , , and . IACR Cryptology ePrint Archive, (2016)Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation., and . IACR Cryptology ePrint Archive, (2004)Coin-based Secure Computations., and . Int. J. Inf. Sec., 21 (4): 833-846 (2022)