Author of the publication

Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.

, , , , , , , , , , and . UIC/ATC/ScalCom, page 1397-1401. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward High Efficiency Polymer Solar Cells: Influence of Local Chemical Environment and Morphology, , , , , , , , , and 2 other author(s). Advanced Energy Materials, (2016)Improved RPN for Single Targets Detection Based on the Anchor Mask Net., , , , and . IGTA, volume 1043 of Communications in Computer and Information Science, page 13-19. Springer, (2019)TreeNet: Learning Sentence Representations with Unconstrained Tree Structure., , , and . IJCAI, page 4005-4011. ijcai.org, (2018)Cohesion based co-location pattern mining., , and . DSAA, page 1-10. IEEE, (2015)Consequent Pole Permanent Magnet Vernier Machine With Asymmetric Air-Gap Field Distribution., , , , , and . IEEE Access, (2019)Macroblock Mode Pre-classification Algorithms based on Motion Vectors Filtering for H.264/AVC., , , and . J. Multim., 8 (2): 129-136 (2013)A BERT-Span model for Chinese named entity recognition in rehabilitation medicine., , , and . PeerJ Comput. Sci., (2023)Deep Learning With Fault Prior for 3-D Seismic Data Super-Resolution., , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)Image representation using block compressive sensing for compression applications., , , and . J. Vis. Commun. Image Represent., 24 (7): 885-894 (2013)A tail adaptive approach for change point detection., , and . J. Multivar. Anal., (2019)