Author of the publication

Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.

, , , , , , , , , , and . UIC/ATC/ScalCom, page 1397-1401. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pointwise convergence to a Maxwellian for a Broadwell model with a supersonic boundary., , and . Networks Heterog. Media, 2 (3): 383-395 (2007)An Ultra-Low Complexity Early Stopping Criterion for Belief Propagation Polar Code Decoder., , , , and . IEEE Commun. Lett., 26 (4): 723-727 (2022)PAOA: A power and area optimization approach of reed-muller logic circuits., , , , , and . MWSCAS, page 1394-1397. IEEE, (2017)Self-Heating characterization and modeling of 5nm technology node FinFETs., , , , and . DRC, page 1-2. IEEE, (2022)A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device., , , , , , , and . IEEE Access, (2018)Improved modeling of flicker noise including velocity saturation effect in FinFETs and experimental validation., , and . Microelectron. J., (2021)Certificateless Network Coding Ring Signature Scheme., and . Secur. Commun. Networks, (2021)Certificateless anti-quantum ring signcryption for network coding., , and . Knowl. Based Syst., (2022)MCVP-NoC: Many-Core Virtual Platform with Networks-on-Chip support., , , , and . ASICON, page 1-4. IEEE, (2013)Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm., , , , , , , and . ICCE, page 1-5. IEEE, (2019)