Author of the publication

JPEG XS, a new standard for visually lossless low-latency lightweight image compression

, , , , and . Applications of Digital Image Processing XL, 10396, page 68 -- 79. International Society for Optics and Photonics, SPIE, (2017)
DOI: 10.1117/12.2273625

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Evaluation of a Radial Soft Hash Algorithm., , , , , and . ITCC (2), page 89-94. IEEE Computer Society, (2005)isbn: 0-7695-2315-3.Hardware implementation of a fingerprinting algorithm suited for digital cinema., , , , , and . EUSIPCO, page 1497-1500. IEEE, (2004)Implementation of the AES-128 on Virtex-5 FPGAs., , , , and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 16-26. Springer, (2008)A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results., , , and . CHES, volume 2523 of Lecture Notes in Computer Science, page 593-609. Springer, (2002)Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis., , , and . IEEE Trans. Computers, 52 (4): 473-482 (2003)An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays., , , and . Proc. IEEE, 94 (2): 383-394 (2006)Efficient FPGA Implementation of Block Cipher MISTY1., , , and . IPDPS, page 185. IEEE Computer Society, (2003)FPGA implementations of the ICEBERG block cipher., , , and . Integr., 40 (1): 20-27 (2007)JPEG XS, a new standard for visually lossless low-latency lightweight image compression, , , , and . Applications of Digital Image Processing XL, 10396, page 68 -- 79. International Society for Optics and Photonics, SPIE, (2017)Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs., , , and . CHES, volume 2779 of Lecture Notes in Computer Science, page 334-350. Springer, (2003)