Author of the publication

Security Analysis on RFID Mutual Authentication Protocol.

, , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 65-74. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Function Masking: A New Countermeasure Against Side Channel Attack., , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 331-342. Springer, (2014)Security Enhancement for IoT Device using Physical Unclonable Functions., , , and . ICTC, page 1457-1459. IEEE, (2019)Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 153-163 (2010)Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices., , , and . IEEE SENSORS, page 1-4. IEEE, (2018)Construction of Efficient and Secure Pairing Algorithm and its Application., , and . IACR Cryptol. ePrint Arch., (2007)Construction of efficient and secure pairing algorithm and its application., , and . J. Commun. Networks, 10 (4): 437-443 (2008)The study of document filter for smart device., , and . APNOMS, page 515-518. IEEE, (2015)Secure IoT Device Authentication Scheme using Key Hiding Technology., , , and . ICTC, page 1808-1810. IEEE, (2020)Toffoli-depth reduction method preserving in-place quantum circuits and its application to SHA3-256., , , , and . Quantum Inf. Process., 23 (4): 153 (April 2024)A new fault cryptanalysis on montgomery ladder exponentiation algorithm., , , , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 896-899. ACM, (2009)