Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-throughput multi-key elliptic curve cryptosystem based on residue number system., , and . IET Comput. Digit. Tech., 11 (5): 165-172 (2017)High-performance elliptic curve cryptography processor over NIST prime fields., , , and . IET Comput. Digit. Tech., 11 (1): 33-42 (2017)Revisiting Sum of Residues Modular Multiplication., and . J. Electr. Comput. Eng., (2010)Local and Global Feature Utilization for Breast Image Classification by Convolutional Neural Network., and . DICTA, page 1-6. IEEE, (2017)Secret Key Classification Based on Electromagnetic Analysis and Feature Extraction Using Machine-Learning Approach., and . FNSS, volume 878 of Communications in Computer and Information Science, page 80-92. Springer, (2018)Performance Analysis of Integrated Canny and Fuzzy-Logic Based (2-by-2 Cell Block) Edge-Detection Algorithms., , and . EMS, page 64-69. IEEE, (2016)Automatic Diagnosis of Schizophrenia using EEG Signals and CNN-LSTM Models., , , , , , , , , and . CoRR, (2021)Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering., , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 3-28. Springer, (2022)FPGA-based efficient modular multiplication for Elliptic Curve Cryptography., and . ITNAC, page 191-195. IEEE Computer Society, (2015)A novel approach for improving error detection and correction in WSN., , and . CCECE, page 1-4. IEEE, (2014)