Author of the publication

Sequential C-code to distributed pipelined heterogeneous MPSoC synthesis for streaming applications.

, , , , and . ICCD, page 216-223. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CoRaS: A multiprocessor key corruption and random round swapping for power analysis side channel attacks: A DES case study., , and . ISCAS, page 253-256. IEEE, (2012)Improving GA-Based NoC Mapping Algorithms Using a Formal Model., , and . ISVLSI, page 344-349. IEEE Computer Society, (2014)MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm., , and . ICCAD, page 678-684. IEEE Computer Society, (2008)QuadSeal: Quadruple algorithmic symmetrizing countermeasure against power based side-channel attacks., , , , and . CASES, page 21-30. IEEE, (2015)Randomised multi-modulo residue number system architecture for double-and-add to prevent power analysis side channel attacks., , , and . IET Circuits Devices Syst., 7 (5): 283-293 (2013)SDG2KPN: System Dependency Graph to function-level KPN generation of legacy code for MPSoCs., , , , and . ASP-DAC, page 267-273. IEEE, (2014)Design and implementation of an operating system for composable processor sharing., , , , , , and . Microprocess. Microsystems, 35 (2): 246-260 (2011)Power analysis side channel attacks: the processor design-level context.. University of New South Wales, Sydney, Australia, (2009)base-search.net (ftunswworks:oai:unsworks.unsw.edu.au:1959.4/43756).Sequential C-code to distributed pipelined heterogeneous MPSoC synthesis for streaming applications., , , , and . ICCD, page 216-223. IEEE Computer Society, (2015)Multiprocessor information concealment architecture to prevent power analysis-based side channel attacks., , , and . IET Comput. Digit. Tech., 5 (1): 1-15 (2011)