Author of the publication

An Anti-power Attacks Implementation of AES Algorithm in ASIC.

, , , and . HPCC/EUC, page 1640-1646. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method Based on Curvature and Hierarchical Strategy for Dynamic Point Cloud Compression in Augmented and Virtual Reality System., , , , and . Sensors, 22 (3): 1262 (2022)An Anti-power Attacks Implementation of AES Algorithm in ASIC., , , and . HPCC/EUC, page 1640-1646. IEEE, (2013)A parallel game model-based intrusion response system for cross-layer security in industrial internet of things., , , , , and . Concurr. Comput. Pract. Exp., (2023)A data balancing approach based on generative adversarial network., , , , and . Future Gener. Comput. Syst., (April 2023)MC-Net: Realistic Sample Generation for Black-Box Attacks., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Design and Implementation of a Dynamic Tracking System for Drones in Modern Medical Treatment Applications., , , and . J. Circuits Syst. Comput., (January 2024)Loss Estimation of Brushless Doubly-Fed Generator With Hybrid Rotor Considering Multiple Influence Factors., , , , and . IEEE Access, (2020)Design and Performance Comparisons of Brushless Doubly Fed Generators With Different Rotor Structures., , , , and . IEEE Trans. Ind. Electron., 66 (1): 631-640 (2019)A VLSI implementation of an SM4 algorithm resistant to power analysis., , , , and . J. Intell. Fuzzy Syst., 31 (2): 795-803 (2016)Clock-Based Sender Identification and Attack Detection for Automotive CAN Network., , , and . IEEE Access, (2021)